insights-operator/gathers.json0000640000000000000000000004202415154662746015273 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/proxies","duration_in_ms":66,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":76,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":70,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":26527,"records_count":192,"errors":["function \"machine_healthchecks\" failed with an error","function \"active_alerts\" failed with an error","function \"tsdb_status\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"machines\" failed with an error","function \"support_secret\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"metrics\" failed with an error","function \"silenced_alerts\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-bxqp2.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-network-node-identity/network-node-identity-znqwc.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-h4kkj.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":60,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":75,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":31,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":99,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":72,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":76,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10882,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5432,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":104,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":38,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":47,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":14,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":62,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":61,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":79,"records_count":5,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":59,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":26,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":78,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":33,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":110,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11614,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":157,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":29,"records_count":0,"errors":["machinehealthchecks.machine.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machinehealthchecks\" in API group \"machine.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":49,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":38,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5435,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":62,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":65,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":75,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":54,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":74,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":64,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":173,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":59,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":59,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":26515,"records_count":103,"errors":["the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-bxqp2.json\" was already recorded and had the fingerprint \"ec9b69ed7a2db74de9596597a178f7760a3767c14ea15af746b082c15f0d38fe\", overwriting with the record having fingerprint \"ec9b69ed7a2db74de9596597a178f7760a3767c14ea15af746b082c15f0d38fe\"","the record with the same name \"config/pod/openshift-network-node-identity/network-node-identity-znqwc.json\" was already recorded and had the fingerprint \"1bebcab3ac77ae9be177789060ef7f147a8cb3102b5a1f00c9ec2a22d9862291\", overwriting with the record having fingerprint \"1bebcab3ac77ae9be177789060ef7f147a8cb3102b5a1f00c9ec2a22d9862291\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-h4kkj.json\" was already recorded and had the fingerprint \"66330025eeb22eab610c56260a704532a53381f40ba715d0502a09a970387c04\", overwriting with the record having fingerprint \"66330025eeb22eab610c56260a704532a53381f40ba715d0502a09a970387c04\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_previous.log\" was already recorded and had the fingerprint \"ce044e66df19da3c00d95e88217b7fb69f618986afb2da2cde95d99471525431\", overwriting with the record having fingerprint \"ce044e66df19da3c00d95e88217b7fb69f618986afb2da2cde95d99471525431\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_current.log\" was already recorded and had the fingerprint \"903621e715a7e42f5367994770c3f8b24d6b9db4f2a8beef616199905ec4e3a3\", overwriting with the record having fingerprint \"903621e715a7e42f5367994770c3f8b24d6b9db4f2a8beef616199905ec4e3a3\""],"warnings":["warning: the record with the same fingerprint \"ec9b69ed7a2db74de9596597a178f7760a3767c14ea15af746b082c15f0d38fe\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-bxqp2.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-bxqp2.json\"","warning: the record with the same fingerprint \"1bebcab3ac77ae9be177789060ef7f147a8cb3102b5a1f00c9ec2a22d9862291\" was already recorded at path \"config/pod/openshift-network-node-identity/network-node-identity-znqwc.json\", recording another one with a different path \"config/pod/openshift-network-node-identity/network-node-identity-znqwc.json\"","warning: the record with the same fingerprint \"66330025eeb22eab610c56260a704532a53381f40ba715d0502a09a970387c04\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-h4kkj.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-h4kkj.json\"","warning: the record with the same fingerprint \"ce044e66df19da3c00d95e88217b7fb69f618986afb2da2cde95d99471525431\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"903621e715a7e42f5367994770c3f8b24d6b9db4f2a8beef616199905ec4e3a3\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_current.log\""],"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":49,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":58,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":69,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":65,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":63,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":99,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":248,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":63,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":55,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":63,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":35,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":63,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":60,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":57,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":53,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":86,"records_count":11,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":27,"records_count":0,"errors":["machines.machine.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machines\" in API group \"machine.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":69,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":103,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":36,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":13,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":49.124,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515154662746020002 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515154662746021104 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005372615154662746014272 0ustar0000000000000000{"pods":82,"imageCount":64,"namespaces":{"0LiT6ZNtbpYL":{"count":6,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"duplicates":1,"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:3f3a3fc0144fd075212160b467722ab529c42c226d7e87d397f821c8e7df8628","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:50fe533376cf6d45ae7e343c58d9c480fb1bc96859ffbbdc51ce2c428de2b653","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:1295a1f0e74ae87f51a733e28b64c6fdb6b9a5b069a6897b3870fe52cc1c3b0b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":2,"terminalCount":2,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":false,"containers":[{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"gcNszUTvGLqr"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":3,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]},{"restartAlways":false,"containers":[{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"gcNszUTvGLqr"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bedf16a5f527126e934c37d2f24886de4a54c9bd9d45b18821d02eefd8b5f9e","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:bc516f6eb3028f5169f1712ac1878d4b591174fd7c363f4ee5aa63162aa01b0e","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011405415154662741033466 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-68f6795949-v9w8g2026-03-13T01:17:52.320553642Z time="2026-03-13T01:17:52Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-13T01:17:52.320659785Z time="2026-03-13T01:17:52Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.148.218:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-13T01:17:52.520025350Z time="2026-03-13T01:17:52Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-13T01:17:52.520025350Z time="2026-03-13T01:17:52Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.164.55:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-13T01:17:53.500617958Z W0313 01:17:53.500531 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.249.77:50051: connect: connection refused" 2026-03-13T01:17:54.321234992Z time="2026-03-13T01:17:54Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-13T01:17:54.321234992Z time="2026-03-13T01:17:54Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.249.77:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-13T01:17:54.329741714Z W0313 01:17:54.328919 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.164.55:50051: connect: connection refused" 2026-03-13T01:17:54.522224749Z time="2026-03-13T01:17:54Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-13T01:17:54.522224749Z time="2026-03-13T01:17:54Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.221.227:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-13T01:17:55.323723511Z W0313 01:17:55.323582 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.148.218:50051: connect: connection refused" 2026-03-13T01:17:56.371029684Z time="2026-03-13T01:17:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-13T01:17:56.371029684Z time="2026-03-13T01:17:56Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.148.218:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-13T01:17:56.521422588Z time="2026-03-13T01:17:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-13T01:17:56.521422588Z time="2026-03-13T01:17:56Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.164.55:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-13T01:17:56.879344990Z W0313 01:17:56.878730 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.221.227:50051: connect: connection refused" 2026-03-13T01:18:02.943180113Z W0313 01:18:02.943083 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.221.227:50051: connect: connection refused" 2026-03-13T01:18:03.736693728Z W0313 01:18:03.735700 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.164.55:50051: connect: connection refused" 2026-03-13T01:18:03.908079750Z W0313 01:18:03.907991 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.249.77:50051: connect: connection refused" 2026-03-13T01:18:04.129968844Z W0313 01:18:04.129901 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.148.218:50051: connect: connection refused" 2026-03-13T01:18:06.842667846Z E0313 01:18:06.842607 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.842667846Z E0313 01:18:06.842619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.842792399Z E0313 01:18:06.842763 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.842847370Z E0313 01:18:06.842830 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.848101938Z E0313 01:18:06.847986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.860488682Z E0313 01:18:06.860381 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.860587524Z E0313 01:18:06.860544 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.863510881Z E0313 01:18:06.860755 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.863510881Z E0313 01:18:06.860771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.863510881Z E0313 01:18:06.860851 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.863510881Z E0313 01:18:06.861187 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.864311642Z E0313 01:18:06.864275 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.867438794Z E0313 01:18:06.867188 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.867438794Z E0313 01:18:06.867337 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.867496385Z E0313 01:18:06.867456 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.867611448Z E0313 01:18:06.867580 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.867727331Z E0313 01:18:06.867686 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.879515729Z E0313 01:18:06.879466 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.880817764Z E0313 01:18:06.879938 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.880817764Z E0313 01:18:06.880209 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.880817764Z E0313 01:18:06.880294 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.880934847Z E0313 01:18:06.880919 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.929831946Z E0313 01:18:06.929782 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.929951899Z E0313 01:18:06.929920 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.930104883Z E0313 01:18:06.930079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.930229856Z E0313 01:18:06.930208 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:06.930262217Z E0313 01:18:06.930085 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.045613334Z E0313 01:18:07.045561 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.045613334Z E0313 01:18:07.045590 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.049416363Z E0313 01:18:07.045729 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.049416363Z E0313 01:18:07.045569 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.049416363Z E0313 01:18:07.046469 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.220528019Z E0313 01:18:07.220471 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.220559560Z E0313 01:18:07.220539 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.226300890Z E0313 01:18:07.226253 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.226542836Z E0313 01:18:07.226510 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.226619978Z E0313 01:18:07.226594 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.555042318Z E0313 01:18:07.554949 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.555042318Z E0313 01:18:07.554989 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.555120360Z E0313 01:18:07.555076 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.555120360Z E0313 01:18:07.555076 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.555196372Z E0313 01:18:07.554991 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:08.212283789Z E0313 01:18:08.212230 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:08.212391372Z E0313 01:18:08.212359 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:08.212545686Z E0313 01:18:08.212507 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:08.212661269Z E0313 01:18:08.212623 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:08.212715600Z E0313 01:18:08.212528 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:09.499213129Z E0313 01:18:09.498724 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:09.499213129Z E0313 01:18:09.499069 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:09.500847681Z E0313 01:18:09.499255 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:09.500847681Z E0313 01:18:09.499429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:09.500847681Z E0313 01:18:09.499643 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:12.067586717Z E0313 01:18:12.064677 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:12.067586717Z E0313 01:18:12.065015 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:12.067586717Z E0313 01:18:12.065204 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:12.067586717Z E0313 01:18:12.065373 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:12.067586717Z E0313 01:18:12.065545 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.120587135Z time="2026-03-13T01:18:14Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-13T01:18:14.120765219Z time="2026-03-13T01:18:14Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.148.218:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-13T01:18:14.427336838Z E0313 01:18:14.424353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.435764598Z E0313 01:18:14.427485 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.441973371Z E0313 01:18:14.441945 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.442422673Z E0313 01:18:14.442205 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.442422673Z E0313 01:18:14.442333 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.490651484Z E0313 01:18:14.490361 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.498456068Z E0313 01:18:14.497707 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:16.727179471Z time="2026-03-13T01:18:16Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-13T01:18:16.727179471Z time="2026-03-13T01:18:16Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.249.77:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-13T01:18:17.114462331Z time="2026-03-13T01:18:17Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-13T01:18:17.114462331Z time="2026-03-13T01:18:17Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.249.77:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-13T01:18:17.188552809Z E0313 01:18:17.188460 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:17.188552809Z E0313 01:18:17.188472 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:17.188552809Z E0313 01:18:17.188514 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:17.188601770Z E0313 01:18:17.188538 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:17.188773075Z E0313 01:18:17.188738 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:18.398879156Z time="2026-03-13T01:18:18Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-13T01:18:19.206751576Z time="2026-03-13T01:18:19Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-13T01:18:20.956235774Z W0313 01:18:20.956154 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.164.55:50051: connect: connection refused" 2026-03-13T01:18:21.828445228Z time="2026-03-13T01:18:21Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-13T01:18:21.828445228Z time="2026-03-13T01:18:21Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.164.55:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" package-server-manager_current.log0000640000000000000000000003251615154662741037145 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-nrzpj2026-03-13T01:14:36.270980863Z 2026-03-13T01:14:36Z INFO setup starting manager 2026-03-13T01:14:36.276643545Z 2026-03-13T01:14:36Z INFO controller-runtime.metrics Starting metrics server 2026-03-13T01:14:36.276661976Z 2026-03-13T01:14:36Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-13T01:14:36.277110298Z 2026-03-13T01:14:36Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-13T01:14:36.277110298Z 2026-03-13T01:14:36Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-13T01:14:36.277110298Z I0313 01:14:36.276826 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-13T01:14:36.339668120Z I0313 01:14:36.336626 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-13T01:14:36.339668120Z 2026-03-13T01:14:36Z DEBUG events package-server-manager-854648ff6d-nrzpj_c189a6b5-a848-4263-a4f6-b2387ee02dda became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"3d314ea1-65da-4592-9d56-5e94de09f82b","apiVersion":"coordination.k8s.io/v1","resourceVersion":"9343"}, "reason": "LeaderElection"} 2026-03-13T01:14:36.339668120Z 2026-03-13T01:14:36Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-13T01:14:36.339668120Z 2026-03-13T01:14:36Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-13T01:14:36.339668120Z 2026-03-13T01:14:36Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-13T01:14:36.526107153Z 2026-03-13T01:14:36Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-13T01:14:36.526107153Z 2026-03-13T01:14:36Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-13T01:14:36.527571052Z 2026-03-13T01:14:36Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T01:14:36.527571052Z 2026-03-13T01:14:36Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:36.840592589Z 2026-03-13T01:14:36Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:36.840619039Z 2026-03-13T01:14:36Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T01:14:36.877171802Z 2026-03-13T01:14:36Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-13T01:14:36.888195509Z 2026-03-13T01:14:36Z INFO controllers.packageserver updating csv spec 2026-03-13T01:14:36.909730268Z 2026-03-13T01:14:36Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-13T01:14:36.909730268Z 2026-03-13T01:14:36Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:36.909730268Z 2026-03-13T01:14:36Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T01:14:36.909730268Z 2026-03-13T01:14:36Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:36.909730268Z 2026-03-13T01:14:36Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:36.927735222Z 2026-03-13T01:14:36Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T01:14:37.010241000Z 2026-03-13T01:14:37Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T01:14:37.010241000Z 2026-03-13T01:14:37Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.010241000Z 2026-03-13T01:14:37Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T01:14:37.010241000Z 2026-03-13T01:14:37Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.010241000Z 2026-03-13T01:14:37Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.010241000Z 2026-03-13T01:14:37Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T01:14:37.031363868Z 2026-03-13T01:14:37Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T01:14:37.031363868Z 2026-03-13T01:14:37Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.034442031Z 2026-03-13T01:14:37Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T01:14:37.036505596Z 2026-03-13T01:14:37Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.041753517Z 2026-03-13T01:14:37Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.041753517Z 2026-03-13T01:14:37Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T01:14:37.051730126Z 2026-03-13T01:14:37Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T01:14:37.051730126Z 2026-03-13T01:14:37Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.051782727Z 2026-03-13T01:14:37Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T01:14:37.051790647Z 2026-03-13T01:14:37Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.051875240Z 2026-03-13T01:14:37Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.051924021Z 2026-03-13T01:14:37Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T01:14:37.083930981Z 2026-03-13T01:14:37Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T01:14:37.083930981Z 2026-03-13T01:14:37Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.879220214Z 2026-03-13T01:14:37Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T01:14:37.879220214Z 2026-03-13T01:14:37Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.879220214Z 2026-03-13T01:14:37Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:37.879220214Z 2026-03-13T01:14:37Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T01:14:37.955790923Z 2026-03-13T01:14:37Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T01:14:37.955790923Z 2026-03-13T01:14:37Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:38.102835647Z 2026-03-13T01:14:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T01:14:38.102835647Z 2026-03-13T01:14:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:38.102835647Z 2026-03-13T01:14:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:38.102835647Z 2026-03-13T01:14:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T01:14:38.141185418Z 2026-03-13T01:14:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T01:14:38.141257150Z 2026-03-13T01:14:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:38.367930274Z 2026-03-13T01:14:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-13T01:14:38.367930274Z 2026-03-13T01:14:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:38.367995226Z 2026-03-13T01:14:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:14:38.368017597Z 2026-03-13T01:14:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-13T01:14:38.399146063Z 2026-03-13T01:14:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-13T01:14:38.399146063Z 2026-03-13T01:14:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-13T01:16:10.412250670Z E0313 01:16:10.412138 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T01:17:10.414919861Z E0313 01:17:10.414827 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) kube-rbac-proxy_current.log0000640000000000000000000000160415154662741035642 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-nrzpj2026-03-13T01:14:24.771293157Z W0313 01:14:24.771075 1 deprecated.go:66] 2026-03-13T01:14:24.771293157Z ==== Removed Flag Warning ====================== 2026-03-13T01:14:24.771293157Z 2026-03-13T01:14:24.771293157Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T01:14:24.771293157Z 2026-03-13T01:14:24.771293157Z =============================================== 2026-03-13T01:14:24.771293157Z 2026-03-13T01:14:24.771815221Z I0313 01:14:24.771774 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T01:14:24.775689625Z I0313 01:14:24.773189 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T01:14:24.775689625Z I0313 01:14:24.773604 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-13T01:14:24.775689625Z I0313 01:14:24.775009 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415154662741033321 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-d64cfc9db-8l7kq2026-03-13T01:18:14.601893004Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=Hvvuv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.620292795Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=73BER namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.643714588Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=BpxLN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.654225092Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=0FfQW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.666028051Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=QafAv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.674251436Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=OxNHM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.678981410Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=Jmxx2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.687592855Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=YA9QP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.791791111Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=xc/WG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.890172314Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=5IaUp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:14.992181822Z time="2026-03-13T01:18:14Z" level=info msg="install strategy successful" csv=packageserver id=83LxW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:15.093161523Z time="2026-03-13T01:18:15Z" level=info msg="install strategy successful" csv=packageserver id=ypHvS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:15.200498861Z time="2026-03-13T01:18:15Z" level=info msg="install strategy successful" csv=packageserver id=CtXja namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:15.318696462Z time="2026-03-13T01:18:15Z" level=info msg="install strategy successful" csv=packageserver id=Xn9xA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:15.398215092Z time="2026-03-13T01:18:15Z" level=info msg="install strategy successful" csv=packageserver id=/DSrk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:15.489140880Z time="2026-03-13T01:18:15Z" level=info msg="install strategy successful" csv=packageserver id=j+J9f namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:15.589799303Z time="2026-03-13T01:18:15Z" level=info msg="install strategy successful" csv=packageserver id=umVER namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:15.881583385Z time="2026-03-13T01:18:15Z" level=info msg="install strategy successful" csv=packageserver id=rf2ex namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:15.896138326Z time="2026-03-13T01:18:15Z" level=info msg="install strategy successful" csv=packageserver id=EJQQk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:15.903441037Z time="2026-03-13T01:18:15Z" level=info msg="install strategy successful" csv=packageserver id=g8Jkk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:16.043208323Z time="2026-03-13T01:18:16Z" level=info msg="install strategy successful" csv=packageserver id=VFAjN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:16.429592838Z time="2026-03-13T01:18:16Z" level=info msg="install strategy successful" csv=packageserver id=mVEmU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:16.770359101Z time="2026-03-13T01:18:16Z" level=info msg="install strategy successful" csv=packageserver id=eiCDF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.116746801Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=4hV+B namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.219184360Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=ycEHe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.320936772Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=CRt64 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.418567625Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=URYKs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.427338515Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=yHUBE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.434429410Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=ayp2r namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.441276409Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=R6JdH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.447145173Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=29mrg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.455483071Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=NAjc6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.461052406Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=fg6My namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.469600210Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=tW3Ph namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.474702713Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=ChgmM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.487135149Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=MPe58 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.590133093Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=xM2+7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.685897207Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=GG3jh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.785543164Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=9j0/k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.886520165Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=6OsrJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:17.987681501Z time="2026-03-13T01:18:17Z" level=info msg="install strategy successful" csv=packageserver id=6Hlnd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.086729631Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=KZR3C namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.186619224Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=r2yE5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.286940908Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=72NpB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.387413556Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=rJ4sp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.491339584Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=y7SG6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.588692721Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=MGMIi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.686079288Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=xJBo1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.786672539Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=RqtWy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.886808468Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=uusnL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:18.985882459Z time="2026-03-13T01:18:18Z" level=info msg="install strategy successful" csv=packageserver id=xKrPw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.086658295Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=FMNhx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.189587468Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=OjfRf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.291990766Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=TJ27M namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.386487338Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=yaJLk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.487517890Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=LXu18 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.591698275Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=DGSnT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.692454290Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=Kmg/F namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.788708067Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=WQjBQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.886804903Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=+BuHT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:19.998842783Z time="2026-03-13T01:18:19Z" level=info msg="install strategy successful" csv=packageserver id=H2aZ9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:21.746156825Z time="2026-03-13T01:18:21Z" level=info msg="install strategy successful" csv=packageserver id=vuzA/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:21.850748591Z time="2026-03-13T01:18:21Z" level=info msg="install strategy successful" csv=packageserver id=GM8Z/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:21.874594555Z time="2026-03-13T01:18:21Z" level=info msg="install strategy successful" csv=packageserver id=Z/PRF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:21.881441414Z time="2026-03-13T01:18:21Z" level=info msg="install strategy successful" csv=packageserver id=0DDto namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:21.889748601Z time="2026-03-13T01:18:21Z" level=info msg="install strategy successful" csv=packageserver id=seo38 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:21.897916655Z time="2026-03-13T01:18:21Z" level=info msg="install strategy successful" csv=packageserver id=27FaX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:21.904008514Z time="2026-03-13T01:18:21Z" level=info msg="install strategy successful" csv=packageserver id=b7aa8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:21.981403539Z time="2026-03-13T01:18:21Z" level=info msg="install strategy successful" csv=packageserver id=Dvdrc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.075236333Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=Z/4iq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.094565588Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=saKA+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.101764057Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=90r0H namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.110183587Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=/8OZC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.118788962Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=eysY5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.126908524Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=MPc8q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.135482979Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=kHPO1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.140755006Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=yS/+b namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.153664824Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=L1wvc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.161660273Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=Jvd7n namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.171734397Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=8XQ66 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.180968838Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=KxavQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.283205352Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=FvHEJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.377665543Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=0RIJj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.470023899Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=LYwNl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.571273097Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=8qnMt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.679667592Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=icNwZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.781887946Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=7HvvR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.880086694Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=m84pu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:22.963388483Z time="2026-03-13T01:18:22Z" level=info msg="install strategy successful" csv=packageserver id=dgTw7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.064331893Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=JST1e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.166012253Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=xs7eX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.270771843Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=rWQxH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.370781258Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=M0Ird namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.464143330Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=tRoQl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.567076792Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=LmGZQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.671239576Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=8pZSP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.777090355Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=jdwd8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.862614742Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=uWt5m namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:23.962796712Z time="2026-03-13T01:18:23Z" level=info msg="install strategy successful" csv=packageserver id=2sHDx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-13T01:18:24.080121811Z time="2026-03-13T01:18:24Z" level=info msg="install strategy successful" csv=packageserver id=kydPL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005714315154662741034727 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-7d9c49f57b-h46pz2026-03-13T01:18:17.120678794Z time="2026-03-13T01:18:17Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=Vm77R 2026-03-13T01:18:17.120678794Z time="2026-03-13T01:18:17Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Vm77R 2026-03-13T01:18:17.120695764Z time="2026-03-13T01:18:17Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Vm77R 2026-03-13T01:18:17.137407681Z time="2026-03-13T01:18:17Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Vm77R 2026-03-13T01:18:17.137470113Z time="2026-03-13T01:18:17Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-z254g current-pod.namespace=openshift-marketplace id=Vm77R 2026-03-13T01:18:17.137478763Z time="2026-03-13T01:18:17Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-z254g current-pod.namespace=openshift-marketplace id=Vm77R 2026-03-13T01:18:17.139069705Z time="2026-03-13T01:18:17Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Vm77R 2026-03-13T01:18:17.139069705Z time="2026-03-13T01:18:17Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=Vm77R 2026-03-13T01:18:18.371336955Z time="2026-03-13T01:18:18Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=community-operators state.State=READY" 2026-03-13T01:18:18.371378537Z time="2026-03-13T01:18:18Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.371396297Z time="2026-03-13T01:18:18Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.371819448Z time="2026-03-13T01:18:18Z" level=info msg="resolving sources" id=Ph9cg namespace=openshift-marketplace 2026-03-13T01:18:18.371819448Z time="2026-03-13T01:18:18Z" level=info msg="checking if subscriptions need update" id=Ph9cg namespace=openshift-marketplace 2026-03-13T01:18:18.375108764Z time="2026-03-13T01:18:18Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=Ph9cg namespace=openshift-marketplace 2026-03-13T01:18:18.376959053Z time="2026-03-13T01:18:18Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.377110107Z time="2026-03-13T01:18:18Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.377110107Z time="2026-03-13T01:18:18Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.377134527Z time="2026-03-13T01:18:18Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=ReF33 2026-03-13T01:18:18.377151088Z time="2026-03-13T01:18:18Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.377151088Z time="2026-03-13T01:18:18Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.389286435Z time="2026-03-13T01:18:18Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.389286435Z time="2026-03-13T01:18:18Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.389286435Z time="2026-03-13T01:18:18Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.389354207Z time="2026-03-13T01:18:18Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.389354207Z time="2026-03-13T01:18:18Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ReF33 2026-03-13T01:18:18.400239972Z time="2026-03-13T01:18:18Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:18.400239972Z time="2026-03-13T01:18:18Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:18.468794425Z time="2026-03-13T01:18:18Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:18.468899647Z time="2026-03-13T01:18:18Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:18.468899647Z time="2026-03-13T01:18:18Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:18.468925288Z time="2026-03-13T01:18:18Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=/qctu 2026-03-13T01:18:18.468925288Z time="2026-03-13T01:18:18Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:18.468925288Z time="2026-03-13T01:18:18Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:19.067644438Z time="2026-03-13T01:18:19Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:19.067810062Z time="2026-03-13T01:18:19Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:19.067810062Z time="2026-03-13T01:18:19Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:19.067829823Z time="2026-03-13T01:18:19Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:19.067829823Z time="2026-03-13T01:18:19Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=/qctu 2026-03-13T01:18:19.078007069Z time="2026-03-13T01:18:19Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:19.078027670Z time="2026-03-13T01:18:19Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:19.470284089Z time="2026-03-13T01:18:19Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:19.470401952Z time="2026-03-13T01:18:19Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:19.470401952Z time="2026-03-13T01:18:19Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:19.470401952Z time="2026-03-13T01:18:19Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=BQvWY 2026-03-13T01:18:19.470401952Z time="2026-03-13T01:18:19Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:19.470401952Z time="2026-03-13T01:18:19Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:20.771717628Z time="2026-03-13T01:18:20Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:20.771717628Z time="2026-03-13T01:18:20Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:20.771717628Z time="2026-03-13T01:18:20Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-bbptx current-pod.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:20.771717628Z time="2026-03-13T01:18:20Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:20.771717628Z time="2026-03-13T01:18:20Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=BQvWY 2026-03-13T01:18:21.645167524Z time="2026-03-13T01:18:21Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.645167524Z time="2026-03-13T01:18:21Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.757579704Z time="2026-03-13T01:18:21Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.757746739Z time="2026-03-13T01:18:21Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.757746739Z time="2026-03-13T01:18:21Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.757769219Z time="2026-03-13T01:18:21Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=wh2l5 2026-03-13T01:18:21.757769219Z time="2026-03-13T01:18:21Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.757769219Z time="2026-03-13T01:18:21Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.776937951Z time="2026-03-13T01:18:21Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.777023093Z time="2026-03-13T01:18:21Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.777023093Z time="2026-03-13T01:18:21Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.777169797Z time="2026-03-13T01:18:21Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.777169797Z time="2026-03-13T01:18:21Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wh2l5 2026-03-13T01:18:21.828250073Z time="2026-03-13T01:18:21Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:21.828250073Z time="2026-03-13T01:18:21Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:21.828250073Z time="2026-03-13T01:18:21Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:21.828250073Z time="2026-03-13T01:18:21Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:21.828250073Z time="2026-03-13T01:18:21Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:21.828250073Z time="2026-03-13T01:18:21Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=N61zI 2026-03-13T01:18:21.828250073Z time="2026-03-13T01:18:21Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:21.828250073Z time="2026-03-13T01:18:21Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:22.070073048Z time="2026-03-13T01:18:22Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:22.070252462Z time="2026-03-13T01:18:22Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:22.070252462Z time="2026-03-13T01:18:22Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:22.070336175Z time="2026-03-13T01:18:22Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:22.070336175Z time="2026-03-13T01:18:22Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=N61zI 2026-03-13T01:18:22.076209918Z time="2026-03-13T01:18:22Z" level=error msg="UpdateStatus - error while setting CatalogSource status" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace error="Operation cannot be fulfilled on catalogsources.operators.coreos.com \"redhat-operators\": the object has been modified; please apply your changes to the latest version and try again" id=N61zI 2026-03-13T01:18:22.076209918Z E0313 01:18:22.076178 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-marketplace/redhat-operators\" failed: Operation cannot be fulfilled on catalogsources.operators.coreos.com \"redhat-operators\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-03-13T01:18:22.078281552Z time="2026-03-13T01:18:22Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:22.078281552Z time="2026-03-13T01:18:22Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:22.468365935Z time="2026-03-13T01:18:22Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:22.468365935Z time="2026-03-13T01:18:22Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:22.468365935Z time="2026-03-13T01:18:22Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:22.468365935Z time="2026-03-13T01:18:22Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=L5ehx 2026-03-13T01:18:22.468365935Z time="2026-03-13T01:18:22Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:22.468365935Z time="2026-03-13T01:18:22Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:23.069493648Z time="2026-03-13T01:18:23Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:23.069616962Z time="2026-03-13T01:18:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:23.069616962Z time="2026-03-13T01:18:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:23.069700794Z time="2026-03-13T01:18:23Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:23.069700794Z time="2026-03-13T01:18:23Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=L5ehx 2026-03-13T01:18:23.069756395Z time="2026-03-13T01:18:23Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=6mXOZ 2026-03-13T01:18:23.069756395Z time="2026-03-13T01:18:23Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=6mXOZ 2026-03-13T01:18:23.485000715Z time="2026-03-13T01:18:23Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=6mXOZ 2026-03-13T01:18:23.485040876Z time="2026-03-13T01:18:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=6mXOZ 2026-03-13T01:18:23.485053807Z time="2026-03-13T01:18:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-k52lh current-pod.namespace=openshift-marketplace id=6mXOZ 2026-03-13T01:18:23.485076367Z time="2026-03-13T01:18:23Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=6mXOZ 2026-03-13T01:18:23.485076367Z time="2026-03-13T01:18:23Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=6mXOZ 2026-03-13T01:18:23.485089518Z time="2026-03-13T01:18:23Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=6mXOZ config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_current.log0000640000000000000000000001120615154662741031134 0ustar00000000000000002026-03-13T01:16:19.597539260Z I0313 01:16:19.596976 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-13T01:16:19.597539260Z I0313 01:16:19.597192 1 observer_polling.go:159] Starting file observer 2026-03-13T01:16:19.600171321Z I0313 01:16:19.600118 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T01:16:19.600262734Z I0313 01:16:19.600184 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T01:16:19.601736444Z I0313 01:16:19.601104 1 observer_polling.go:159] Starting file observer 2026-03-13T01:17:19.608233639Z W0313 01:17:19.608106 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods etcd-operator-5884b9cd56-h4kkj) 2026-03-13T01:17:19.608420464Z I0313 01:17:19.608363 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602170912.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-13T01:17:40.044751419Z I0313 01:17:40.043437 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T01:17:40.044751419Z W0313 01:17:40.043475 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:17:40.044751419Z W0313 01:17:40.043502 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:17:40.044751419Z W0313 01:17:40.043508 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T01:17:40.044751419Z W0313 01:17:40.043512 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T01:17:40.044751419Z W0313 01:17:40.043516 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T01:17:40.044751419Z W0313 01:17:40.043520 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T01:17:40.050890257Z I0313 01:17:40.049485 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T01:17:40.050890257Z I0313 01:17:40.049545 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T01:17:40.050890257Z I0313 01:17:40.049577 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T01:17:40.050890257Z I0313 01:17:40.049610 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T01:17:40.063484420Z I0313 01:17:40.062615 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T01:17:40.063484420Z I0313 01:17:40.062855 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:17:40.063484420Z I0313 01:17:40.062867 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:17:40.063484420Z I0313 01:17:40.062886 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:17:40.063484420Z I0313 01:17:40.062892 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:17:40.151366759Z I0313 01:17:40.150675 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T01:17:40.162996703Z I0313 01:17:40.162941 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:17:40.163741148Z I0313 01:17:40.163708 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:17:58.125712660Z I0313 01:17:58.121297 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T01:17:58.125712660Z I0313 01:17:58.121859 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-h4kkj/etcd-operator_previous.log0000640000000000000000000004131015154662741031325 0ustar00000000000000002026-03-13T01:15:04.174807703Z I0313 01:15:04.174119 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174125 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174137 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174149 1 base_controller.go:113] All EtcdMembersController workers have been terminated 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174160 1 base_controller.go:113] All FSyncController workers have been terminated 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174220 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174243 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174251 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174267 1 base_controller.go:181] Shutting down etcd ... 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174283 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174299 1 base_controller.go:181] Shutting down EtcdStaticResources-StaticResources ... 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174403 1 base_controller.go:181] Shutting down etcd-Node ... 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174461 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174505 1 base_controller.go:181] Shutting down BootstrapTeardownController ... 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174527 1 base_controller.go:181] Shutting down EtcdCertSignerController ... 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174709 1 base_controller.go:123] Shutting down worker of DefragController controller ... 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174730 1 base_controller.go:113] All DefragController workers have been terminated 2026-03-13T01:15:04.174807703Z E0313 01:15:04.174749 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-all-bundles\": context canceled" 2026-03-13T01:15:04.174807703Z I0313 01:15:04.174792 1 base_controller.go:181] Shutting down MachineDeletionHooksController ... 2026-03-13T01:15:04.174905465Z I0313 01:15:04.174863 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-03-13T01:15:04.174905465Z I0313 01:15:04.174887 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-03-13T01:15:04.174905465Z I0313 01:15:04.174886 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T01:15:04.174924016Z I0313 01:15:04.174901 1 controller_manager.go:54] etcd-Node controller terminated 2026-03-13T01:15:04.174939876Z I0313 01:15:04.174927 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T01:15:04.174955557Z I0313 01:15:04.174945 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T01:15:04.174971007Z I0313 01:15:04.174955 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T01:15:04.174986467Z I0313 01:15:04.174957 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T01:15:04.175041159Z I0313 01:15:04.175003 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-13T01:15:04.175041159Z I0313 01:15:04.175035 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-13T01:15:04.176962581Z I0313 01:15:04.175093 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T01:15:04.177085994Z I0313 01:15:04.175098 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T01:15:04.177178626Z I0313 01:15:04.177153 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T01:15:04.177233308Z I0313 01:15:04.175159 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T01:15:04.177293239Z I0313 01:15:04.175339 1 base_controller.go:123] Shutting down worker of MachineDeletionHooksController controller ... 2026-03-13T01:15:04.177342381Z I0313 01:15:04.175489 1 base_controller.go:181] Shutting down ClusterMemberController ... 2026-03-13T01:15:04.177389862Z I0313 01:15:04.175512 1 base_controller.go:181] Shutting down ScriptController ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.175533 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.175557 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.175547 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.175583 1 base_controller.go:181] Shutting down Installer ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.175587 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.175601 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.175616 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.175679 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.175971 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.176002 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-03-13T01:15:04.179159710Z I0313 01:15:04.176026 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:15:04.179159710Z I0313 01:15:04.176045 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:15:04.179159710Z I0313 01:15:04.176070 1 envvarcontroller.go:252] Shutting down EnvVarController 2026-03-13T01:15:04.179159710Z I0313 01:15:04.176127 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-172332942/tls.crt::/tmp/serving-cert-172332942/tls.key" 2026-03-13T01:15:04.179159710Z I0313 01:15:04.176202 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-03-13T01:15:04.179159710Z E0313 01:15:04.176847 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts\": context canceled" 2026-03-13T01:15:04.179159710Z I0313 01:15:04.177157 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"e5411e2a-3305-46b8-a158-687b325921aa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-03-13T01:15:04.179159710Z I0313 01:15:04.177194 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T01:15:04.179159710Z E0313 01:15:04.177331 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T01:15:04.179159710Z I0313 01:15:04.177378 1 base_controller.go:113] All MachineDeletionHooksController workers have been terminated 2026-03-13T01:15:04.179159710Z E0313 01:15:04.177412 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/svc.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/services/etcd\": context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T01:15:04.179159710Z E0313 01:15:04.178205 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178539 1 base_controller.go:113] All etcd workers have been terminated 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178572 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178592 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178598 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178592 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178614 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178606 1 builder.go:335] server exited 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178651 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178658 1 controller_manager.go:54] Installer controller terminated 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178669 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-03-13T01:15:04.179159710Z I0313 01:15:04.178680 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-03-13T01:15:04.179856358Z I0313 01:15:04.179810 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-13T01:15:04.179856358Z I0313 01:15:04.179845 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-13T01:15:04.179896210Z I0313 01:15:04.179874 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T01:15:04.179896210Z I0313 01:15:04.179889 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T01:15:04.179919770Z I0313 01:15:04.179900 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T01:15:04.179935541Z I0313 01:15:04.179921 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-13T01:15:04.179951181Z I0313 01:15:04.179935 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-13T01:15:04.179966471Z I0313 01:15:04.179952 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T01:15:04.179981782Z I0313 01:15:04.179964 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T01:15:08.812153339Z I0313 01:15:08.812052 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="9f9607d1f3c40257350d0b6d5e0d7553ace1b424bb6962499727fb760f0861fb") 2026-03-13T01:15:08.812153339Z I0313 01:15:08.812101 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-03-13T01:15:08.812227511Z I0313 01:15:08.812195 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="f583b8573530330cc6b39854a34e79d2e66e0b16f21919e726f4c0dfe7f08b89") 2026-03-13T01:15:08.812227511Z I0313 01:15:08.812208 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-03-13T01:15:08.812342164Z I0313 01:15:08.812294 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="f30edf68cb3d99b99f1a18de867bd9f6a327e5bd8c712a2c34645bd0dd07e0e8") 2026-03-13T01:15:08.812342164Z I0313 01:15:08.812314 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-03-13T01:15:08.812433866Z I0313 01:15:08.812390 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="c642d1e49a61a8f284adbc82b53d277406c6e069eed8c4f3a8e83ad82a820436") 2026-03-13T01:15:08.812433866Z I0313 01:15:08.812407 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-03-13T01:15:08.812534459Z I0313 01:15:08.812490 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="86abd79dbaabec5346a3553ab3134967eadade702721bd7dcc68a624c44b8fb5") 2026-03-13T01:15:08.812534459Z I0313 01:15:08.812510 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-03-13T01:15:08.812621641Z I0313 01:15:08.812587 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="455b217977d22f7ea296e434e9c14e73211958743c5643c2791a9e7b08617dcc") 2026-03-13T01:15:08.812621641Z I0313 01:15:08.812608 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-03-13T01:15:09.170852673Z I0313 01:15:09.170754 1 observer_polling.go:162] Shutting down file observer 2026-03-13T01:15:17.383168681Z W0313 01:15:17.383077 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T01:15:18.988245998Z W0313 01:15:18.988145 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T01:15:18.991698290Z E0313 01:15:18.991553 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-03-13T01:15:18.992791400Z I0313 01:15:18.992720 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-03-13T01:15:18.992791400Z I0313 01:15:18.992752 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-03-13T01:15:19.383460014Z I0313 01:15:19.383379 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T01:15:34.385961131Z W0313 01:15:34.385845 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-13T01:15:38.175483894Z E0313 01:15:38.175399 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T01:15:38.175483894Z W0313 01:15:38.175468 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-h4kkj.json0000640000000000000000000001576315154662741024062 0ustar0000000000000000{"metadata":{"name":"etcd-operator-5884b9cd56-h4kkj","generateName":"etcd-operator-5884b9cd56-","namespace":"openshift-etcd-operator","uid":"21cbea73-f779-43e4-b5ba-d6fa06275d34","resourceVersion":"9864","creationTimestamp":"2026-03-13T01:11:38Z","labels":{"app":"etcd-operator","pod-template-hash":"5884b9cd56"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-5884b9cd56","uid":"ef1333f0-db23-4b82-95b4-8b7682e96fa9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-wg54c","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-wg54c","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-03-13T01:13:10Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-13T01:16:19Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T01:13:38Z","finishedAt":"2026-03-13T01:15:38Z","containerID":"cri-o://d3c0f89339f815b6350fac22cc030760b6b90e8219eb2eb8f1fd3b1e19f0b649"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","containerID":"cri-o://62d2b92f5805220707a2be14d18659481c24419c7f112e9e794398a7182f05dd","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-wg54c","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000003313415154662741034102 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-69c74d8d69-jpj8z2026-03-13T01:14:06.315529307Z W0313 01:14:06.315245 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-13T01:14:06.317438401Z I0313 01:14:06.317414 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773364446 cert, and key in /tmp/serving-cert-3487046753/serving-signer.crt, /tmp/serving-cert-3487046753/serving-signer.key 2026-03-13T01:14:06.714007910Z I0313 01:14:06.713939 1 observer_polling.go:159] Starting file observer 2026-03-13T01:14:06.741490609Z I0313 01:14:06.741447 1 builder.go:304] check-endpoints version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-13T01:14:06.745013368Z I0313 01:14:06.744975 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3487046753/tls.crt::/tmp/serving-cert-3487046753/tls.key" 2026-03-13T01:14:07.100504537Z I0313 01:14:07.100440 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-13T01:14:07.102252876Z I0313 01:14:07.102206 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-13T01:14:07.102252876Z I0313 01:14:07.102228 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-13T01:14:07.102271177Z I0313 01:14:07.102249 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-13T01:14:07.102271177Z I0313 01:14:07.102257 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-13T01:14:07.106793664Z I0313 01:14:07.106614 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T01:14:07.106793664Z I0313 01:14:07.106656 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-13T01:14:07.106793664Z W0313 01:14:07.106663 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:14:07.106793664Z W0313 01:14:07.106672 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:14:07.106793664Z W0313 01:14:07.106679 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T01:14:07.106793664Z W0313 01:14:07.106683 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T01:14:07.106793664Z W0313 01:14:07.106687 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T01:14:07.106793664Z W0313 01:14:07.106691 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T01:14:07.109543200Z I0313 01:14:07.109511 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:14:07.109581211Z I0313 01:14:07.109560 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:14:07.109615602Z I0313 01:14:07.109600 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T01:14:07.109665224Z I0313 01:14:07.109653 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T01:14:07.109735346Z I0313 01:14:07.109720 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:14:07.109776797Z I0313 01:14:07.109765 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:14:07.109900240Z I0313 01:14:07.109865 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:14:07.109900240Z I0313 01:14:07.109889 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:14:07.110073565Z I0313 01:14:07.110035 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3487046753/tls.crt::/tmp/serving-cert-3487046753/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773364446\" (2026-03-13 01:14:05 +0000 UTC to 2026-04-12 01:14:06 +0000 UTC (now=2026-03-13 01:14:07.109973132 +0000 UTC))" 2026-03-13T01:14:07.110112226Z I0313 01:14:07.110084 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3487046753/tls.crt::/tmp/serving-cert-3487046753/tls.key" 2026-03-13T01:14:07.110291611Z I0313 01:14:07.110247 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773364447\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773364446\" (2026-03-13 00:14:06 +0000 UTC to 2027-03-13 00:14:06 +0000 UTC (now=2026-03-13 01:14:07.110215409 +0000 UTC))" 2026-03-13T01:14:07.110304972Z I0313 01:14:07.110286 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-13T01:14:07.110387194Z I0313 01:14:07.110352 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-13T01:14:07.110397744Z I0313 01:14:07.110382 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T01:14:07.110869268Z I0313 01:14:07.110835 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-13T01:14:07.124363485Z I0313 01:14:07.124279 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:14:07.124363485Z I0313 01:14:07.124293 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:14:07.124427507Z I0313 01:14:07.124406 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:14:07.209791696Z I0313 01:14:07.209722 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:14:07.209932490Z I0313 01:14:07.209739 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T01:14:07.210490326Z I0313 01:14:07.210452 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 00:56:08 +0000 UTC to 2036-03-10 00:56:08 +0000 UTC (now=2026-03-13 01:14:07.210406343 +0000 UTC))" 2026-03-13T01:14:07.213613863Z I0313 01:14:07.213584 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 01:03:12 +0000 UTC to 2026-03-14 01:03:12 +0000 UTC (now=2026-03-13 01:14:07.213549511 +0000 UTC))" 2026-03-13T01:14:07.213713826Z I0313 01:14:07.210739 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:14:07.213850580Z I0313 01:14:07.213807 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 01:03:13 +0000 UTC to 2027-03-13 01:03:13 +0000 UTC (now=2026-03-13 01:14:07.213737797 +0000 UTC))" 2026-03-13T01:14:07.213869560Z I0313 01:14:07.213848 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 01:03:13 +0000 UTC to 2027-03-13 01:03:13 +0000 UTC (now=2026-03-13 01:14:07.213834589 +0000 UTC))" 2026-03-13T01:14:07.213885631Z I0313 01:14:07.213869 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 01:03:10 +0000 UTC to 2036-03-10 01:03:10 +0000 UTC (now=2026-03-13 01:14:07.21385781 +0000 UTC))" 2026-03-13T01:14:07.214152138Z I0313 01:14:07.214090 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3487046753/tls.crt::/tmp/serving-cert-3487046753/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773364446\" (2026-03-13 01:14:05 +0000 UTC to 2026-04-12 01:14:06 +0000 UTC (now=2026-03-13 01:14:07.214073206 +0000 UTC))" 2026-03-13T01:14:07.214286742Z I0313 01:14:07.214240 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773364447\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773364446\" (2026-03-13 00:14:06 +0000 UTC to 2027-03-13 00:14:06 +0000 UTC (now=2026-03-13 01:14:07.21422514 +0000 UTC))" 2026-03-13T01:14:07.214459397Z I0313 01:14:07.214412 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 00:56:08 +0000 UTC to 2036-03-10 00:56:08 +0000 UTC (now=2026-03-13 01:14:07.214399485 +0000 UTC))" 2026-03-13T01:14:07.214459397Z I0313 01:14:07.214438 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 01:03:12 +0000 UTC to 2026-03-14 01:03:12 +0000 UTC (now=2026-03-13 01:14:07.214426576 +0000 UTC))" 2026-03-13T01:14:07.214519029Z I0313 01:14:07.214486 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 01:03:13 +0000 UTC to 2027-03-13 01:03:13 +0000 UTC (now=2026-03-13 01:14:07.214444426 +0000 UTC))" 2026-03-13T01:14:07.214519029Z I0313 01:14:07.214508 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 01:03:13 +0000 UTC to 2027-03-13 01:03:13 +0000 UTC (now=2026-03-13 01:14:07.214498098 +0000 UTC))" 2026-03-13T01:14:07.214547999Z I0313 01:14:07.214525 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 01:03:10 +0000 UTC to 2036-03-10 01:03:10 +0000 UTC (now=2026-03-13 01:14:07.214513898 +0000 UTC))" 2026-03-13T01:14:07.214547999Z I0313 01:14:07.214541 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 01:03:11 +0000 UTC to 2026-03-14 01:03:11 +0000 UTC (now=2026-03-13 01:14:07.214530969 +0000 UTC))" 2026-03-13T01:14:07.214768706Z I0313 01:14:07.214675 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3487046753/tls.crt::/tmp/serving-cert-3487046753/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773364446\" (2026-03-13 01:14:05 +0000 UTC to 2026-04-12 01:14:06 +0000 UTC (now=2026-03-13 01:14:07.214662783 +0000 UTC))" 2026-03-13T01:14:07.214826437Z I0313 01:14:07.214795 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773364447\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773364446\" (2026-03-13 00:14:06 +0000 UTC to 2027-03-13 00:14:06 +0000 UTC (now=2026-03-13 01:14:07.214783646 +0000 UTC))" 2026-03-13T01:14:07.435540205Z I0313 01:14:07.435423 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:14:07.511296835Z I0313 01:14:07.511192 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-13T01:14:07.511296835Z I0313 01:14:07.511236 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-69c74d8d69-jpj8z/openshift-apiserver_current.log0000640000000000000000000011366615154662741031116 0ustar00000000000000002026-03-13T01:17:53.108684497Z E0313 01:17:53.108384 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:53.132695035Z I0313 01:17:53.132602 1 policy_source.go:224] refreshing policies 2026-03-13T01:17:53.404230537Z E0313 01:17:53.403555 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:53.404230537Z E0313 01:17:53.403660 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:53.404230537Z E0313 01:17:53.403675 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:53.404230537Z E0313 01:17:53.403709 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:53.410664575Z E0313 01:17:53.410601 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:54.547134760Z E0313 01:17:54.547023 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:54.547486930Z E0313 01:17:54.547441 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:54.547486930Z E0313 01:17:54.547457 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:54.547562812Z E0313 01:17:54.547521 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:54.547878230Z E0313 01:17:54.547833 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.495894 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.496604 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.496679 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.496864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.496972 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.497087 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.497133 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.497329 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.497347 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.497726443Z E0313 01:17:55.497442 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.522420528Z E0313 01:17:55.522347 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.522679705Z E0313 01:17:55.522619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.522704476Z E0313 01:17:55.522685 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.522704476Z E0313 01:17:55.522676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:55.522946072Z E0313 01:17:55.522917 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:57.943199766Z E0313 01:17:57.943110 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:57.943273128Z E0313 01:17:57.943188 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:57.943539145Z E0313 01:17:57.943340 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:57.943690229Z E0313 01:17:57.943110 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:57.943779621Z E0313 01:17:57.943733 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:07.163740744Z I0313 01:18:07.163580 1 policy_source.go:224] refreshing policies 2026-03-13T01:18:10.179119172Z I0313 01:18:10.179035 1 policy_source.go:224] refreshing policies 2026-03-13T01:18:11.179826426Z I0313 01:18:11.179758 1 policy_source.go:224] refreshing policies 2026-03-13T01:18:11.193738160Z I0313 01:18:11.193694 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-13T01:18:11.195525477Z I0313 01:18:11.195482 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:18:14.402408716Z E0313 01:18:14.402059 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.402442827Z E0313 01:18:14.402406 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.404481600Z E0313 01:18:14.402567 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.404481600Z E0313 01:18:14.402744 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.404481600Z E0313 01:18:14.402904 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.404481600Z E0313 01:18:14.403037 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.404481600Z E0313 01:18:14.403189 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.404481600Z E0313 01:18:14.403348 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.404481600Z E0313 01:18:14.404156 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.409013649Z E0313 01:18:14.408985 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.409273706Z E0313 01:18:14.409242 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.409420620Z E0313 01:18:14.409385 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.413319951Z E0313 01:18:14.413285 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.413514797Z E0313 01:18:14.413350 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.413666 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.413771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.413854 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.413935 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.414023 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.414366 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.414494 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.414773 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.414967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.415125 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.415453 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.415582 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.415677 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.415804 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.415896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.416364271Z E0313 01:18:14.415932 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425084739Z E0313 01:18:14.424537 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425084739Z E0313 01:18:14.424699 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425084739Z E0313 01:18:14.424921 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425084739Z E0313 01:18:14.425056 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425671554Z E0313 01:18:14.425166 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425671554Z E0313 01:18:14.425295 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425671554Z E0313 01:18:14.425359 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425671554Z E0313 01:18:14.425374 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425671554Z E0313 01:18:14.425462 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425671554Z E0313 01:18:14.425487 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425671554Z E0313 01:18:14.425595 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.425671554Z E0313 01:18:14.425611 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.429388342Z E0313 01:18:14.425299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.429388342Z E0313 01:18:14.425751 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.429388342Z E0313 01:18:14.425866 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.469470730Z E0313 01:18:14.469413 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.469661025Z E0313 01:18:14.469578 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.477112760Z E0313 01:18:14.476329 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.477112760Z E0313 01:18:14.476565 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.509079026Z E0313 01:18:14.509016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.509131537Z E0313 01:18:14.509102 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.517444645Z E0313 01:18:14.517374 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.517444645Z E0313 01:18:14.517411 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.524160481Z E0313 01:18:14.523865 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.524815898Z E0313 01:18:14.524279 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.535095307Z E0313 01:18:14.535061 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.535258751Z E0313 01:18:14.535225 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.543346532Z E0313 01:18:14.543265 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.551417064Z E0313 01:18:14.550177 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.560473430Z E0313 01:18:14.559403 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.560473430Z E0313 01:18:14.559801 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.572799463Z E0313 01:18:14.570283 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:18:14.572799463Z E0313 01:18:14.570360 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001040715154662741040406 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-mvmt22026-03-13T01:16:19.452349351Z I0313 01:16:19.450478 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T01:16:19.452349351Z I0313 01:16:19.450664 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T01:16:19.452349351Z I0313 01:16:19.451265 1 observer_polling.go:159] Starting file observer 2026-03-13T01:17:19.462950447Z W0313 01:17:19.461840 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods) 2026-03-13T01:17:19.462950447Z I0313 01:17:19.462098 1 builder.go:304] openshift-apiserver-operator version - 2026-03-13T01:17:40.074972794Z I0313 01:17:40.074792 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T01:17:40.074972794Z W0313 01:17:40.074823 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:17:40.074972794Z W0313 01:17:40.074834 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:17:40.074972794Z W0313 01:17:40.074838 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T01:17:40.074972794Z W0313 01:17:40.074842 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T01:17:40.074972794Z W0313 01:17:40.074845 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T01:17:40.074972794Z W0313 01:17:40.074848 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T01:17:40.078824830Z I0313 01:17:40.077852 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T01:17:40.078824830Z I0313 01:17:40.077907 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T01:17:40.078824830Z I0313 01:17:40.077928 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T01:17:40.078824830Z I0313 01:17:40.077996 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T01:17:40.078824830Z I0313 01:17:40.078030 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T01:17:40.078824830Z I0313 01:17:40.078074 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:17:40.078824830Z I0313 01:17:40.078087 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:17:40.078824830Z I0313 01:17:40.078100 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:17:40.078824830Z I0313 01:17:40.078107 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:17:40.178693777Z I0313 01:17:40.178154 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:17:40.178693777Z I0313 01:17:40.178180 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T01:17:40.178693777Z I0313 01:17:40.178306 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:17:58.131194403Z I0313 01:17:58.131135 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T01:17:58.132005374Z I0313 01:17:58.131975 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... openshift-apiserver-operator_previous.log0000640000000000000000000004167215154662741040610 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-mvmt22026-03-13T01:14:38.184298347Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T01:14:38.184298347Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/build.openshift.io/v1: 401 2026-03-13T01:14:38.184298347Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/image.openshift.io/v1: 401 2026-03-13T01:14:38.184298347Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/project.openshift.io/v1: 401 2026-03-13T01:14:38.184298347Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/quota.openshift.io/v1: 401 2026-03-13T01:14:38.184298347Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/route.openshift.io/v1: 401 2026-03-13T01:14:38.184298347Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/security.openshift.io/v1: 401 2026-03-13T01:14:38.184298347Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/template.openshift.io/v1: 401 2026-03-13T01:14:38.184298347Z > 2026-03-13T01:14:39.978785106Z E0313 01:14:39.978731 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-13T01:14:39.978785106Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/apps.openshift.io/v1: 401 2026-03-13T01:14:39.978785106Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/authorization.openshift.io/v1: 401 2026-03-13T01:14:39.978785106Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/build.openshift.io/v1: 401 2026-03-13T01:14:39.978785106Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/image.openshift.io/v1: 401 2026-03-13T01:14:39.978785106Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/project.openshift.io/v1: 401 2026-03-13T01:14:39.978785106Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/quota.openshift.io/v1: 401 2026-03-13T01:14:39.978785106Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/route.openshift.io/v1: 401 2026-03-13T01:14:39.978785106Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/security.openshift.io/v1: 401 2026-03-13T01:14:39.978785106Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/template.openshift.io/v1: 401 2026-03-13T01:14:39.978785106Z > 2026-03-13T01:14:56.102673774Z I0313 01:14:56.101128 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="5b045c0fd26d484a0a0ddef16c6a2d2b6dbedd74833e42517f09e7656220cd5f") 2026-03-13T01:14:56.102673774Z W0313 01:14:56.101177 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.key was created 2026-03-13T01:14:56.102673774Z I0313 01:14:56.101260 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="a8a6a82a839c2fd958f36693beefa269e94aa837b655359d175fee77b563483e") 2026-03-13T01:14:56.102673774Z I0313 01:14:56.101718 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-13T01:14:56.102673774Z I0313 01:14:56.101740 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T01:14:56.102711545Z I0313 01:14:56.102685 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-03-13T01:14:56.102711545Z I0313 01:14:56.102702 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-13T01:14:56.102719025Z I0313 01:14:56.102711 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-03-13T01:14:56.102725805Z I0313 01:14:56.102718 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-03-13T01:14:56.102732525Z I0313 01:14:56.102727 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-03-13T01:14:56.102739146Z I0313 01:14:56.102734 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-03-13T01:14:56.102745796Z I0313 01:14:56.102740 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.102753 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.102765 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-13T01:14:56.104473482Z E0313 01:14:56.102958 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.apps.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-13T01:14:56.104473482Z I0313 01:14:56.102982 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.102992 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.102999 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103007 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103048 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103070 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103077 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103093 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103103 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103114 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103126 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103698 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T01:14:56.104473482Z E0313 01:14:56.103941 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103958 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103976 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103982 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-13T01:14:56.104473482Z I0313 01:14:56.103999 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T01:14:56.104473482Z I0313 01:14:56.104043 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T01:14:56.104473482Z I0313 01:14:56.104053 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T01:14:56.104473482Z I0313 01:14:56.104061 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T01:14:56.104473482Z I0313 01:14:56.104198 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T01:14:56.104473482Z I0313 01:14:56.104212 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:14:56.104473482Z I0313 01:14:56.104221 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:14:56.104473482Z I0313 01:14:56.104308 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-900388846/tls.crt::/tmp/serving-cert-900388846/tls.key" 2026-03-13T01:14:56.104473482Z I0313 01:14:56.104424 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-03-13T01:14:56.104473482Z I0313 01:14:56.104465 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104529 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104553 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104561 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104567 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104574 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104578 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104585 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104592 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104593 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104604 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104598 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104580 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104611 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104653 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104621 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104661 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104662 1 builder.go:335] server exited 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104667 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104687 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104614 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104717 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104662 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104737 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104625 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104754 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104645 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104661 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104774 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104779 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104670 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104570 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104789 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104696 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-03-13T01:14:56.105563492Z I0313 01:14:56.104802 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-03-13T01:14:56.106498317Z I0313 01:14:56.105971 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-13T01:14:56.106498317Z I0313 01:14:56.106002 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-13T01:15:01.100764770Z I0313 01:15:01.100703 1 observer_polling.go:162] Shutting down file observer 2026-03-13T01:15:30.103840778Z E0313 01:15:30.103745 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T01:15:30.103840778Z W0313 01:15:30.103804 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-mvmt2.json0000640000000000000000000001443615154662741030327 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-799b6db4d7-mvmt2","generateName":"openshift-apiserver-operator-799b6db4d7-","namespace":"openshift-apiserver-operator","uid":"486c7e33-3dd8-4a98-87e3-8216ee2e05ef","resourceVersion":"9841","creationTimestamp":"2026-03-13T01:11:38Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"799b6db4d7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-799b6db4d7","uid":"e97ed6e8-4fc7-4ae0-8152-bc9f9385205a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-74tvv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-74tvv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c4"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-03-13T01:13:10Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-13T01:16:19Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T01:13:25Z","finishedAt":"2026-03-13T01:15:30Z","containerID":"cri-o://451217a595b413aec4246a9b014bde1e3a621bb8bc794b9a2470a8f43c1c8d3b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","containerID":"cri-o://3386a3e179b760a480294045f0ff532d50506e45395937cbdf6059ad9ea50ed9","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-74tvv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}network-operator_current.log0000640000000000000000000003414115154662741033206 0ustar0000000000000000config/pod/openshift-network-operator/logs/network-operator-7c649bf6d4-bdc4j2026-03-13T01:18:17.151035138Z I0313 01:18:17.150991 1 log.go:245] Apply / Create of (/v1, Kind=Service) openshift-network-diagnostics/network-check-target was successful 2026-03-13T01:18:17.151126610Z I0313 01:18:17.151113 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=Role) openshift-config-managed/openshift-network-public-role 2026-03-13T01:18:17.352044075Z I0313 01:18:17.351996 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=Role) openshift-config-managed/openshift-network-public-role was successful 2026-03-13T01:18:17.352073856Z I0313 01:18:17.352047 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-config-managed/openshift-network-public-role-binding 2026-03-13T01:18:17.551729278Z I0313 01:18:17.551674 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-config-managed/openshift-network-public-role-binding was successful 2026-03-13T01:18:17.551762589Z I0313 01:18:17.551743 1 log.go:245] reconciling (/v1, Kind=Namespace) /openshift-network-node-identity 2026-03-13T01:18:17.754261626Z I0313 01:18:17.754214 1 log.go:245] Apply / Create of (/v1, Kind=Namespace) /openshift-network-node-identity was successful 2026-03-13T01:18:17.754292346Z I0313 01:18:17.754263 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-node-identity/network-node-identity 2026-03-13T01:18:17.952029298Z I0313 01:18:17.951971 1 log.go:245] Apply / Create of (/v1, Kind=ServiceAccount) openshift-network-node-identity/network-node-identity was successful 2026-03-13T01:18:17.952029298Z I0313 01:18:17.952019 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /network-node-identity 2026-03-13T01:18:18.153263532Z I0313 01:18:18.152037 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /network-node-identity was successful 2026-03-13T01:18:18.153263532Z I0313 01:18:18.152078 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /network-node-identity 2026-03-13T01:18:18.352495783Z I0313 01:18:18.352410 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /network-node-identity was successful 2026-03-13T01:18:18.352495783Z I0313 01:18:18.352480 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/network-node-identity-leases 2026-03-13T01:18:18.554137167Z I0313 01:18:18.554076 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/network-node-identity-leases was successful 2026-03-13T01:18:18.554211849Z I0313 01:18:18.554133 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=Role) openshift-network-node-identity/network-node-identity-leases 2026-03-13T01:18:18.751883399Z I0313 01:18:18.751129 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=Role) openshift-network-node-identity/network-node-identity-leases was successful 2026-03-13T01:18:18.751883399Z I0313 01:18:18.751177 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/system:openshift:scc:hostnetwork-v2 2026-03-13T01:18:18.951196952Z I0313 01:18:18.951122 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/system:openshift:scc:hostnetwork-v2 was successful 2026-03-13T01:18:18.951196952Z I0313 01:18:18.951167 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-node-identity/ovnkube-identity-cm 2026-03-13T01:18:19.152693533Z I0313 01:18:19.151106 1 log.go:245] Apply / Create of (/v1, Kind=ConfigMap) openshift-network-node-identity/ovnkube-identity-cm was successful 2026-03-13T01:18:19.152693533Z I0313 01:18:19.151152 1 log.go:245] reconciling (network.operator.openshift.io/v1, Kind=OperatorPKI) openshift-network-node-identity/network-node-identity 2026-03-13T01:18:19.356986276Z I0313 01:18:19.356922 1 log.go:245] Apply / Create of (network.operator.openshift.io/v1, Kind=OperatorPKI) openshift-network-node-identity/network-node-identity was successful 2026-03-13T01:18:19.356986276Z I0313 01:18:19.356969 1 log.go:245] reconciling (admissionregistration.k8s.io/v1, Kind=ValidatingWebhookConfiguration) /network-node-identity.openshift.io 2026-03-13T01:18:19.558089146Z I0313 01:18:19.558046 1 log.go:245] Apply / Create of (admissionregistration.k8s.io/v1, Kind=ValidatingWebhookConfiguration) /network-node-identity.openshift.io was successful 2026-03-13T01:18:19.558129757Z I0313 01:18:19.558088 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-node-identity/network-node-identity 2026-03-13T01:18:19.758700372Z I0313 01:18:19.758643 1 log.go:245] Apply / Create of (apps/v1, Kind=DaemonSet) openshift-network-node-identity/network-node-identity was successful 2026-03-13T01:18:19.758700372Z I0313 01:18:19.758685 1 log.go:245] reconciling (monitoring.coreos.com/v1, Kind=PrometheusRule) openshift-network-operator/openshift-network-operator-ipsec-rules 2026-03-13T01:18:19.954604616Z I0313 01:18:19.954435 1 log.go:245] Apply / Create of (monitoring.coreos.com/v1, Kind=PrometheusRule) openshift-network-operator/openshift-network-operator-ipsec-rules was successful 2026-03-13T01:18:19.954604616Z I0313 01:18:19.954480 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /openshift-iptables-alerter 2026-03-13T01:18:21.624102553Z I0313 01:18:21.621057 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /openshift-iptables-alerter was successful 2026-03-13T01:18:21.624102553Z I0313 01:18:21.621144 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter 2026-03-13T01:18:21.629464993Z I0313 01:18:21.629383 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T01:18:21.743744122Z I0313 01:18:21.742383 1 log.go:245] Apply / Create of (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter was successful 2026-03-13T01:18:21.743744122Z I0313 01:18:21.742437 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter 2026-03-13T01:18:21.751271409Z I0313 01:18:21.750846 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter was successful 2026-03-13T01:18:21.751271409Z I0313 01:18:21.750905 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script 2026-03-13T01:18:21.758978041Z I0313 01:18:21.758919 1 log.go:245] Apply / Create of (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script was successful 2026-03-13T01:18:21.758978041Z I0313 01:18:21.758968 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter 2026-03-13T01:18:21.774544968Z I0313 01:18:21.773692 1 log.go:245] Apply / Create of (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter was successful 2026-03-13T01:18:21.828550120Z I0313 01:18:21.803440 1 log.go:245] Skipping reconcile of Network.operator.openshift.io: spec unchanged 2026-03-13T01:18:21.828550120Z I0313 01:18:21.803781 1 log.go:245] Network operator config updated with conditions: 2026-03-13T01:18:21.828550120Z - lastTransitionTime: "2026-03-13T01:12:08Z" 2026-03-13T01:18:21.828550120Z status: "False" 2026-03-13T01:18:21.828550120Z type: ManagementStateDegraded 2026-03-13T01:18:21.828550120Z - lastTransitionTime: "2026-03-13T01:18:21Z" 2026-03-13T01:18:21.828550120Z status: "False" 2026-03-13T01:18:21.828550120Z type: Degraded 2026-03-13T01:18:21.828550120Z - lastTransitionTime: "2026-03-13T01:11:57Z" 2026-03-13T01:18:21.828550120Z status: "True" 2026-03-13T01:18:21.828550120Z type: Upgradeable 2026-03-13T01:18:21.828550120Z - lastTransitionTime: "2026-03-13T01:18:10Z" 2026-03-13T01:18:21.828550120Z status: "False" 2026-03-13T01:18:21.828550120Z type: Progressing 2026-03-13T01:18:21.828550120Z - lastTransitionTime: "2026-03-13T01:13:22Z" 2026-03-13T01:18:21.828550120Z status: "True" 2026-03-13T01:18:21.828550120Z type: Available 2026-03-13T01:18:21.835467291Z I0313 01:18:21.835140 1 log.go:245] ClusterOperator config status updated with conditions: 2026-03-13T01:18:21.835467291Z - lastTransitionTime: "2026-03-13T01:12:08Z" 2026-03-13T01:18:21.835467291Z status: "False" 2026-03-13T01:18:21.835467291Z type: ManagementStateDegraded 2026-03-13T01:18:21.835467291Z - lastTransitionTime: "2026-03-13T01:18:21Z" 2026-03-13T01:18:21.835467291Z status: "False" 2026-03-13T01:18:21.835467291Z type: Degraded 2026-03-13T01:18:21.835467291Z - lastTransitionTime: "2026-03-13T01:11:57Z" 2026-03-13T01:18:21.835467291Z status: "True" 2026-03-13T01:18:21.835467291Z type: Upgradeable 2026-03-13T01:18:21.835467291Z - lastTransitionTime: "2026-03-13T01:18:10Z" 2026-03-13T01:18:21.835467291Z status: "False" 2026-03-13T01:18:21.835467291Z type: Progressing 2026-03-13T01:18:21.835467291Z - lastTransitionTime: "2026-03-13T01:13:22Z" 2026-03-13T01:18:21.835467291Z status: "True" 2026-03-13T01:18:21.835467291Z type: Available 2026-03-13T01:18:21.835467291Z I0313 01:18:21.835171 1 log.go:245] Operconfig Controller complete 2026-03-13T01:18:21.835467291Z I0313 01:18:21.835225 1 log.go:245] Reconciling Network.operator.openshift.io cluster 2026-03-13T01:18:21.862020116Z I0313 01:18:21.861950 1 log.go:245] consoleplugins.console.openshift.io CRD was not found: customresourcedefinitions.apiextensions.k8s.io "consoleplugins.console.openshift.io" not found 2026-03-13T01:18:21.897803282Z I0313 01:18:21.897718 1 log.go:245] consoleplugins.console.openshift.io CRD was not found: customresourcedefinitions.apiextensions.k8s.io "consoleplugins.console.openshift.io" not found 2026-03-13T01:18:21.996624997Z I0313 01:18:21.996546 1 log.go:245] consoleplugins.console.openshift.io CRD was not found: customresourcedefinitions.apiextensions.k8s.io "consoleplugins.console.openshift.io" not found 2026-03-13T01:18:22.105194436Z I0313 01:18:22.105132 1 ovn_kubernetes.go:782] For Label network.operator.openshift.io/dpu-host=, the list of nodes are [] 2026-03-13T01:18:22.109504159Z I0313 01:18:22.107908 1 ovn_kubernetes.go:782] For Label network.operator.openshift.io/dpu=, the list of nodes are [] 2026-03-13T01:18:22.110598608Z I0313 01:18:22.110548 1 ovn_kubernetes.go:782] For Label network.operator.openshift.io/smart-nic=, the list of nodes are [] 2026-03-13T01:18:22.110598608Z I0313 01:18:22.110574 1 ovn_kubernetes.go:871] OVN configuration is now &{GatewayMode: HyperShiftConfig:0xc002f08be0 DisableUDPAggregation:false DpuHostModeLabel:network.operator.openshift.io/dpu-host DpuHostModeNodes:[] DpuModeLabel:network.operator.openshift.io/dpu DpuModeNodes:[] SmartNicModeLabel:network.operator.openshift.io/smart-nic SmartNicModeNodes:[] MgmtPortResourceName:} 2026-03-13T01:18:22.122102879Z I0313 01:18:22.122038 1 ovn_kubernetes.go:1643] deployment openshift-ovn-kubernetes/ovnkube-control-plane rollout complete; 1/1 scheduled; 1 available; generation 1 -> 1 2026-03-13T01:18:22.122102879Z I0313 01:18:22.122061 1 ovn_kubernetes.go:1648] deployment openshift-ovn-kubernetes/ovnkube-control-plane rollout complete 2026-03-13T01:18:22.122102879Z I0313 01:18:22.122070 1 ovn_kubernetes.go:1163] ovnkube-control-plane deployment status: progressing=false 2026-03-13T01:18:22.127739576Z I0313 01:18:22.126218 1 ovn_kubernetes.go:1608] daemonset openshift-ovn-kubernetes/ovnkube-node rollout complete; 1/1 scheduled; 0 unavailable; 1 available; generation 2 -> 2 2026-03-13T01:18:22.127739576Z I0313 01:18:22.126243 1 ovn_kubernetes.go:1613] daemonset openshift-ovn-kubernetes/ovnkube-node rollout complete 2026-03-13T01:18:22.127739576Z I0313 01:18:22.126247 1 ovn_kubernetes.go:1608] daemonset openshift-ovn-kubernetes/ovnkube-node rollout complete; 1/1 scheduled; 0 unavailable; 1 available; generation 2 -> 2 2026-03-13T01:18:22.127739576Z I0313 01:18:22.126252 1 ovn_kubernetes.go:1613] daemonset openshift-ovn-kubernetes/ovnkube-node rollout complete 2026-03-13T01:18:22.127739576Z I0313 01:18:22.126266 1 ovn_kubernetes.go:1194] ovnkube-node DaemonSet status: progressing=false 2026-03-13T01:18:22.129483572Z I0313 01:18:22.129454 1 ovn_kubernetes.go:1236] Found the DefaultV4MasqueradeSubnet(169.254.0.0/17) in the "networkoperator.openshift.io/default-masquerade-network-cidrs" annotation 2026-03-13T01:18:22.130523459Z I0313 01:18:22.129472 1 ovn_kubernetes.go:1233] Found the DefaultV6MasqueradeSubnet(fd69::/112) in the "networkoperator.openshift.io/default-masquerade-network-cidrs" annotation 2026-03-13T01:18:22.133143527Z I0313 01:18:22.132894 1 log.go:245] Starting render phase 2026-03-13T01:18:22.146584889Z I0313 01:18:22.146541 1 ovn_kubernetes.go:333] OVN_EGRESSIP_HEALTHCHECK_PORT env var is not defined. Using: 9107 2026-03-13T01:18:22.178146194Z I0313 01:18:22.178081 1 ovn_kubernetes.go:1372] IP family mode: node=single-stack, controlPlane=single-stack 2026-03-13T01:18:22.178146194Z I0313 01:18:22.178105 1 ovn_kubernetes.go:1344] IP family change: updateNode=true, updateControlPlane=true 2026-03-13T01:18:22.178146194Z I0313 01:18:22.178124 1 ovn_kubernetes.go:1516] OVN-Kubernetes control-plane and node already at release version 4.18.34; no changes required 2026-03-13T01:18:22.178182945Z I0313 01:18:22.178143 1 ovn_kubernetes.go:524] ovnk components: ovnkube-node: isRunning=true, update=true; ovnkube-control-plane: isRunning=true, update=true 2026-03-13T01:18:22.188718481Z I0313 01:18:22.188548 1 ovn_kubernetes.go:1608] daemonset openshift-network-node-identity/network-node-identity rollout complete; 1/1 scheduled; 0 unavailable; 1 available; generation 1 -> 1 2026-03-13T01:18:22.188718481Z I0313 01:18:22.188568 1 ovn_kubernetes.go:1613] daemonset openshift-network-node-identity/network-node-identity rollout complete network-operator_previous.log0000640000000000000000000004727715154662741033416 0ustar0000000000000000config/pod/openshift-network-operator/logs/network-operator-7c649bf6d4-bdc4j2026-03-13T01:14:36.225824519Z I0313 01:14:36.224362 1 log.go:245] Apply / Create of (/v1, Kind=Service) openshift-network-diagnostics/network-check-source was successful 2026-03-13T01:14:36.225824519Z I0313 01:14:36.224419 1 log.go:245] reconciling (monitoring.coreos.com/v1, Kind=ServiceMonitor) openshift-network-diagnostics/network-check-source 2026-03-13T01:14:36.257143221Z I0313 01:14:36.257097 1 log.go:245] Apply / Create of (monitoring.coreos.com/v1, Kind=ServiceMonitor) openshift-network-diagnostics/network-check-source was successful 2026-03-13T01:14:36.257242594Z I0313 01:14:36.257228 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=Role) openshift-network-diagnostics/prometheus-k8s 2026-03-13T01:14:36.299534191Z I0313 01:14:36.299257 1 log.go:245] Apply / Create of (rbac.authorization.k8s.io/v1, Kind=Role) openshift-network-diagnostics/prometheus-k8s was successful 2026-03-13T01:14:36.299534191Z I0313 01:14:36.299303 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-diagnostics/prometheus-k8s 2026-03-13T01:14:36.329399454Z I0313 01:14:36.328067 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="3836fe00faa21ec7cf86132b904c3d62f7c996474e26c228f5c932ba041fdca6") 2026-03-13T01:14:36.329399454Z W0313 01:14:36.328102 1 builder.go:154] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-13T01:14:36.329399454Z I0313 01:14:36.328141 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="4fa3862788ef8d1b75d3977ddf1284af295f167f7710533206cb425f06ebcb35") 2026-03-13T01:14:36.329399454Z I0313 01:14:36.328211 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-13T01:14:36.329399454Z I0313 01:14:36.328261 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T01:14:36.329399454Z I0313 01:14:36.328443 1 base_controller.go:173] Shutting down ManagementStateController ... 2026-03-13T01:14:36.329399454Z I0313 01:14:36.328453 1 base_controller.go:173] Shutting down LoggingSyncer ... 2026-03-13T01:14:36.329399454Z I0313 01:14:36.328475 1 internal.go:538] "Stopping and waiting for non leader election runnables" 2026-03-13T01:14:36.329399454Z I0313 01:14:36.328486 1 internal.go:542] "Stopping and waiting for leader election runnables" 2026-03-13T01:14:36.329399454Z I0313 01:14:36.329141 1 base_controller.go:173] Shutting down ConnectivityCheckController ... 2026-03-13T01:14:36.329399454Z I0313 01:14:36.329175 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T01:14:36.329399454Z I0313 01:14:36.329193 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T01:14:36.329399454Z I0313 01:14:36.329206 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T01:14:36.329399454Z I0313 01:14:36.329254 1 secure_serving.go:258] Stopped listening on [::]:9104 2026-03-13T01:14:36.329399454Z I0313 01:14:36.329263 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T01:14:36.329399454Z I0313 01:14:36.329358 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T01:14:36.329399454Z I0313 01:14:36.329370 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:14:36.329399454Z I0313 01:14:36.329380 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:14:36.329545498Z I0313 01:14:36.329523 1 base_controller.go:115] Shutting down worker of ManagementStateController controller ... 2026-03-13T01:14:36.329575339Z I0313 01:14:36.329566 1 base_controller.go:105] All ManagementStateController workers have been terminated 2026-03-13T01:14:36.329602309Z I0313 01:14:36.329593 1 base_controller.go:115] Shutting down worker of LoggingSyncer controller ... 2026-03-13T01:14:36.329625420Z I0313 01:14:36.329616 1 base_controller.go:105] All LoggingSyncer workers have been terminated 2026-03-13T01:14:36.329753413Z I0313 01:14:36.329739 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-diagnostics/prometheus-k8s: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-diagnostics/prometheus-k8s: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.329817155Z I0313 01:14:36.329806 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-diagnostics/network-check-target 2026-03-13T01:14:36.329990030Z I0313 01:14:36.329977 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-diagnostics/network-check-target: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-diagnostics/network-check-target: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.330027421Z I0313 01:14:36.330016 1 log.go:245] reconciling (/v1, Kind=Service) openshift-network-diagnostics/network-check-target 2026-03-13T01:14:36.330116583Z I0313 01:14:36.330082 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="configmap-trust-bundle-injector-controller" 2026-03-13T01:14:36.330125963Z I0313 01:14:36.330118 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="dashboard-controller" 2026-03-13T01:14:36.330160884Z I0313 01:14:36.330146 1 controller.go:239] "All workers finished" controller="configmap-trust-bundle-injector-controller" 2026-03-13T01:14:36.330170705Z I0313 01:14:36.330165 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="allowlist-controller" 2026-03-13T01:14:36.330199185Z I0313 01:14:36.330185 1 controller.go:239] "All workers finished" controller="allowlist-controller" 2026-03-13T01:14:36.330207376Z I0313 01:14:36.330198 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="machineconfigpool-watcher" 2026-03-13T01:14:36.330207376Z I0313 01:14:36.330204 1 controller.go:239] "All workers finished" controller="machineconfigpool-watcher" 2026-03-13T01:14:36.330219676Z I0313 01:14:36.330211 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="infrastructureconfig-controller" 2026-03-13T01:14:36.330227206Z I0313 01:14:36.330217 1 controller.go:239] "All workers finished" controller="infrastructureconfig-controller" 2026-03-13T01:14:36.330234166Z I0313 01:14:36.330225 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="operconfig-controller" 2026-03-13T01:14:36.330241287Z I0313 01:14:36.330232 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="egress-router-controller" 2026-03-13T01:14:36.330241287Z I0313 01:14:36.330237 1 controller.go:239] "All workers finished" controller="egress-router-controller" 2026-03-13T01:14:36.330250147Z I0313 01:14:36.330244 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="proxyconfig-controller" 2026-03-13T01:14:36.330257097Z I0313 01:14:36.330250 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="clusterconfig-controller" 2026-03-13T01:14:36.330263997Z I0313 01:14:36.330255 1 controller.go:239] "All workers finished" controller="clusterconfig-controller" 2026-03-13T01:14:36.330270867Z I0313 01:14:36.330264 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="pki-controller" 2026-03-13T01:14:36.330277958Z I0313 01:14:36.330270 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="ingress-config-controller" 2026-03-13T01:14:36.330277958Z I0313 01:14:36.330275 1 controller.go:239] "All workers finished" controller="ingress-config-controller" 2026-03-13T01:14:36.330286798Z I0313 01:14:36.330282 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="machineconfig-watcher" 2026-03-13T01:14:36.330293728Z I0313 01:14:36.330287 1 controller.go:239] "All workers finished" controller="machineconfig-watcher" 2026-03-13T01:14:36.330316019Z I0313 01:14:36.330301 1 controller.go:239] "All workers finished" controller="proxyconfig-controller" 2026-03-13T01:14:36.330316019Z I0313 01:14:36.330187 1 log.go:245] could not apply (/v1, Kind=Service) openshift-network-diagnostics/network-check-target: failed to apply / update (/v1, Kind=Service) openshift-network-diagnostics/network-check-target: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.330352300Z I0313 01:14:36.330340 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="signer-controller" 2026-03-13T01:14:36.330378460Z I0313 01:14:36.330360 1 controller.go:239] "All workers finished" controller="pki-controller" 2026-03-13T01:14:36.330378460Z I0313 01:14:36.330354 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=Role) openshift-config-managed/openshift-network-public-role 2026-03-13T01:14:36.330399821Z I0313 01:14:36.330390 1 controller.go:239] "All workers finished" controller="signer-controller" 2026-03-13T01:14:36.330425662Z I0313 01:14:36.330417 1 controller.go:237] "Shutdown signal received, waiting for all workers to finish" controller="pod-watcher" 2026-03-13T01:14:36.330448042Z I0313 01:14:36.330440 1 controller.go:239] "All workers finished" controller="pod-watcher" 2026-03-13T01:14:36.330475173Z I0313 01:14:36.330466 1 controller.go:239] "All workers finished" controller="dashboard-controller" 2026-03-13T01:14:36.330522504Z I0313 01:14:36.330513 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-4101732733/tls.crt::/tmp/serving-cert-4101732733/tls.key" 2026-03-13T01:14:36.330551335Z I0313 01:14:36.330534 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=Role) openshift-config-managed/openshift-network-public-role: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=Role) openshift-config-managed/openshift-network-public-role: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.330560975Z I0313 01:14:36.330555 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-config-managed/openshift-network-public-role-binding 2026-03-13T01:14:36.330710229Z I0313 01:14:36.330692 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-config-managed/openshift-network-public-role-binding: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-config-managed/openshift-network-public-role-binding: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.330725110Z I0313 01:14:36.330716 1 log.go:245] reconciling (/v1, Kind=Namespace) /openshift-network-node-identity 2026-03-13T01:14:36.330816502Z I0313 01:14:36.330789 1 log.go:245] could not apply (/v1, Kind=Namespace) /openshift-network-node-identity: failed to apply / update (/v1, Kind=Namespace) /openshift-network-node-identity: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.330827292Z I0313 01:14:36.330821 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-node-identity/network-node-identity 2026-03-13T01:14:36.330861093Z I0313 01:14:36.330850 1 base_controller.go:115] Shutting down worker of ConnectivityCheckController controller ... 2026-03-13T01:14:36.330884454Z I0313 01:14:36.330876 1 base_controller.go:105] All ConnectivityCheckController workers have been terminated 2026-03-13T01:14:36.330905414Z I0313 01:14:36.330882 1 log.go:245] could not apply (/v1, Kind=ServiceAccount) openshift-network-node-identity/network-node-identity: failed to apply / update (/v1, Kind=ServiceAccount) openshift-network-node-identity/network-node-identity: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.330943485Z I0313 01:14:36.330934 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /network-node-identity 2026-03-13T01:14:36.331048698Z I0313 01:14:36.331037 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /network-node-identity: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /network-node-identity: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.331083729Z I0313 01:14:36.331074 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /network-node-identity 2026-03-13T01:14:36.331180172Z I0313 01:14:36.331169 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /network-node-identity: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /network-node-identity: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.331214343Z I0313 01:14:36.331205 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/network-node-identity-leases 2026-03-13T01:14:36.331299575Z I0313 01:14:36.331287 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/network-node-identity-leases: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/network-node-identity-leases: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.331337556Z I0313 01:14:36.331328 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=Role) openshift-network-node-identity/network-node-identity-leases 2026-03-13T01:14:36.331401598Z I0313 01:14:36.330913 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T01:14:36.331401598Z I0313 01:14:36.331396 1 builder.go:329] server exited 2026-03-13T01:14:36.331460309Z I0313 01:14:36.331449 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=Role) openshift-network-node-identity/network-node-identity-leases: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=Role) openshift-network-node-identity/network-node-identity-leases: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.331494490Z I0313 01:14:36.331485 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/system:openshift:scc:hostnetwork-v2 2026-03-13T01:14:36.331600363Z I0313 01:14:36.331588 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/system:openshift:scc:hostnetwork-v2: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=RoleBinding) openshift-network-node-identity/system:openshift:scc:hostnetwork-v2: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.331651874Z I0313 01:14:36.331641 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-node-identity/ovnkube-identity-cm 2026-03-13T01:14:36.331744327Z I0313 01:14:36.331733 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-node-identity/ovnkube-identity-cm: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-node-identity/ovnkube-identity-cm: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.331780018Z I0313 01:14:36.331770 1 log.go:245] reconciling (network.operator.openshift.io/v1, Kind=OperatorPKI) openshift-network-node-identity/network-node-identity 2026-03-13T01:14:36.331875440Z I0313 01:14:36.331864 1 log.go:245] could not apply (network.operator.openshift.io/v1, Kind=OperatorPKI) openshift-network-node-identity/network-node-identity: failed to apply / update (network.operator.openshift.io/v1, Kind=OperatorPKI) openshift-network-node-identity/network-node-identity: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.331909061Z I0313 01:14:36.331900 1 log.go:245] reconciling (admissionregistration.k8s.io/v1, Kind=ValidatingWebhookConfiguration) /network-node-identity.openshift.io 2026-03-13T01:14:36.336176726Z I0313 01:14:36.332000 1 log.go:245] could not apply (admissionregistration.k8s.io/v1, Kind=ValidatingWebhookConfiguration) /network-node-identity.openshift.io: failed to apply / update (admissionregistration.k8s.io/v1, Kind=ValidatingWebhookConfiguration) /network-node-identity.openshift.io: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.336248888Z I0313 01:14:36.336224 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-node-identity/network-node-identity 2026-03-13T01:14:36.336418953Z I0313 01:14:36.336406 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-node-identity/network-node-identity: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-node-identity/network-node-identity: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.336455274Z I0313 01:14:36.336445 1 log.go:245] reconciling (monitoring.coreos.com/v1, Kind=PrometheusRule) openshift-network-operator/openshift-network-operator-ipsec-rules 2026-03-13T01:14:36.336549966Z I0313 01:14:36.336538 1 log.go:245] could not apply (monitoring.coreos.com/v1, Kind=PrometheusRule) openshift-network-operator/openshift-network-operator-ipsec-rules: failed to apply / update (monitoring.coreos.com/v1, Kind=PrometheusRule) openshift-network-operator/openshift-network-operator-ipsec-rules: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.336585307Z I0313 01:14:36.336576 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /openshift-iptables-alerter 2026-03-13T01:14:36.336694200Z I0313 01:14:36.336682 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRole) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.336733671Z I0313 01:14:36.336724 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter 2026-03-13T01:14:36.336813373Z I0313 01:14:36.336800 1 log.go:245] could not apply (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: failed to apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled 2026-03-13T01:14:36.336858004Z I0313 01:14:36.336844 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter 2026-03-13T01:14:36.336885055Z W0313 01:14:36.334993 1 leaderelection.go:84] leader election lost 2026-03-13T01:14:36.336907786Z I0313 01:14:36.335237 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-network-operator", Name:"network-operator-lock", UID:"6e52d044-3678-4035-a8d2-c69b4234a2f8", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"9346", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' master-0_e04361ec-a1ac-475f-8376-f05d8e0724be stopped leading config/pod/openshift-network-operator/network-operator-7c649bf6d4-bdc4j.json0000640000000000000000000002111415154662741025421 0ustar0000000000000000{"metadata":{"name":"network-operator-7c649bf6d4-bdc4j","generateName":"network-operator-7c649bf6d4-","namespace":"openshift-network-operator","uid":"bfc49699-9428-4bff-804d-da0e60551759","resourceVersion":"9676","creationTimestamp":"2026-03-13T01:11:37Z","labels":{"name":"network-operator","pod-template-hash":"7c649bf6d4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7c649bf6d4","uid":"a0056256-0826-4d92-a3b9-064ffa3f8a76","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-zdzjn","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9242604e78efada5aeb232d73a7963f806b754213f5d92b1dffc9b493d7b5a65"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b19b9d0e5437b0bb19cafc3fb516f654c911cdf11184c0de9a27b43c6b80c9ce"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3aa7c84e73a2a19cc9baca38b7e86dfcde579aa88221647c332c83f047d5ae6d"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5bfe4d3125d98cc501d5a529d3ae2497106a2bbb5a6dd06df7c0e0930d168212"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b62afe74fdcb011a4a8c8fa5572dbab2514dda673ae4be4c6beaef92d28216ba"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-zdzjn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:11:41Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:11:38Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:11:38Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T01:11:38Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-13T01:14:37Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T01:11:55Z","finishedAt":"2026-03-13T01:14:36Z","containerID":"cri-o://ea2d52d5a4050a1c6648d96fe621d92a024e84b0306d25332de51586b15ec9dd"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","containerID":"cri-o://045cf1f0774d199db7359b9c5ba3caaa20fbbe198d9372303441cd3a9663f259","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-zdzjn","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/logs/iptables-alerter-qclwv/iptables-alerter_current.log0000640000000000000000000000013415154662741031660 0ustar00000000000000002026-03-13T01:13:42.431436298Z Fri Mar 13 01:13:42 UTC 2026 2026-03-13T01:15:19.733140216Z config/pod/openshift-network-node-identity/logs/network-node-identity-znqwc/approver_current.log0000640000000000000000000001026115154662741032214 0ustar00000000000000002026-03-13T01:15:45.088229071Z + [[ -f /env/_master ]] 2026-03-13T01:15:45.088967511Z ++ date '+%m%d %H:%M:%S.%N' 2026-03-13T01:15:45.093483713Z I0313 01:15:45.092761623 - network-node-identity - start approver 2026-03-13T01:15:45.093506034Z + echo 'I0313 01:15:45.092761623 - network-node-identity - start approver' 2026-03-13T01:15:45.093522924Z + exec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 --disable-webhook --csr-acceptance-conditions=/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json --loglevel=4 2026-03-13T01:15:45.133463535Z I0313 01:15:45.133246 1 ovnkubeidentity.go:133] Config: {kubeconfig: apiServer:https://api-int.sno.openstack.lab:6443 logLevel:4 port:9443 host:localhost certDir: metricsAddress:0 leaseNamespace: enableInterconnect:false enableHybridOverlay:false disableWebhook:true disableApprover:false waitForKAPIDuration:0 localKAPIPort:6443 extraAllowedUsers:{slice:[] separator:{sep: disabled:false customized:false} hasBeenSet:false keepSpace:false} csrAcceptanceConditionFile:/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json csrAcceptanceConditions:[] podAdmissionConditionFile: podAdmissionConditions:[]} 2026-03-13T01:15:45.133463535Z W0313 01:15:45.133431 1 client_config.go:667] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. 2026-03-13T01:15:45.134524403Z I0313 01:15:45.134457 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:15:45.134524403Z I0313 01:15:45.134493 1 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:15:45.134524403Z I0313 01:15:45.134505 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:15:45.134524403Z I0313 01:15:45.134514 1 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:15:45.134554674Z I0313 01:15:45.134522 1 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:15:45.135655534Z I0313 01:15:45.135577 1 ovnkubeidentity.go:472] Starting certificate signing request approver 2026-03-13T01:15:45.135913661Z I0313 01:15:45.135855 1 leaderelection.go:257] attempting to acquire leader lease openshift-network-node-identity/ovnkube-identity... 2026-03-13T01:16:00.145497915Z E0313 01:16:00.145381 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io ovnkube-identity) 2026-03-13T01:16:00.145497915Z I0313 01:16:00.145415 1 leaderelection.go:266] failed to acquire lease openshift-network-node-identity/ovnkube-identity 2026-03-13T01:16:44.396830961Z E0313 01:16:44.396611 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io ovnkube-identity) 2026-03-13T01:16:44.396830961Z I0313 01:16:44.396720 1 leaderelection.go:266] failed to acquire lease openshift-network-node-identity/ovnkube-identity 2026-03-13T01:17:22.345685984Z E0313 01:17:22.345500 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get "https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:22.345685984Z I0313 01:17:22.345580 1 leaderelection.go:266] failed to acquire lease openshift-network-node-identity/ovnkube-identity 2026-03-13T01:17:53.687864466Z I0313 01:17:53.687794 1 leaderelection.go:456] lock is held by master-0_117467dd-4a54-4c62-8054-6bfbc174e777 and has not yet expired 2026-03-13T01:17:53.687975788Z I0313 01:17:53.687954 1 leaderelection.go:266] failed to acquire lease openshift-network-node-identity/ovnkube-identity config/pod/openshift-network-node-identity/logs/network-node-identity-znqwc/webhook_current.log0000640000000000000000000000631415154662741032020 0ustar00000000000000002026-03-13T01:12:48.902518503Z + [[ -f /env/_master ]] 2026-03-13T01:12:48.902518503Z + ho_enable=--enable-hybrid-overlay 2026-03-13T01:12:48.904099167Z ++ date '+%m%d %H:%M:%S.%N' 2026-03-13T01:12:48.907580165Z I0313 01:12:48.906848014 - network-node-identity - start webhook 2026-03-13T01:12:48.907675187Z + echo 'I0313 01:12:48.906848014 - network-node-identity - start webhook' 2026-03-13T01:12:48.908035007Z + exec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 --webhook-cert-dir=/etc/webhook-cert --webhook-host=127.0.0.1 --webhook-port=9743 --enable-hybrid-overlay --enable-interconnect --disable-approver --extra-allowed-user=system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane --wait-for-kubernetes-api=200s --pod-admission-conditions=/var/run/ovnkube-identity-config/additional-pod-admission-cond.json --loglevel=2 2026-03-13T01:12:48.956499854Z I0313 01:12:48.956314 1 ovnkubeidentity.go:133] Config: {kubeconfig: apiServer:https://api-int.sno.openstack.lab:6443 logLevel:2 port:9743 host:127.0.0.1 certDir:/etc/webhook-cert metricsAddress:0 leaseNamespace: enableInterconnect:true enableHybridOverlay:true disableWebhook:false disableApprover:true waitForKAPIDuration:200000000000 localKAPIPort:6443 extraAllowedUsers:{slice:[system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane] separator:{sep: disabled:false customized:false} hasBeenSet:true keepSpace:false} csrAcceptanceConditionFile: csrAcceptanceConditions:[] podAdmissionConditionFile:/var/run/ovnkube-identity-config/additional-pod-admission-cond.json podAdmissionConditions:[]} 2026-03-13T01:12:48.956499854Z W0313 01:12:48.956478 1 client_config.go:667] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. 2026-03-13T01:12:48.957791460Z I0313 01:12:48.957714 1 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:12:48.957791460Z I0313 01:12:48.957751 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:12:48.957791460Z I0313 01:12:48.957763 1 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:12:48.957791460Z I0313 01:12:48.957773 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:12:48.957791460Z I0313 01:12:48.957783 1 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:12:48.958857910Z I0313 01:12:48.958817 1 ovnkubeidentity.go:352] Waiting for caches to sync 2026-03-13T01:12:48.973876770Z I0313 01:12:48.971666 1 reflector.go:430] "Caches populated" type="*v1.Node" reflector="k8s.io/client-go/informers/factory.go:160" 2026-03-13T01:12:49.060030322Z I0313 01:12:49.059965 1 certwatcher.go:211] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-03-13T01:12:49.060290659Z I0313 01:12:49.060270 1 ovnkubeidentity.go:431] Starting the webhook server 2026-03-13T01:12:49.060428113Z I0313 01:12:49.060406 1 certwatcher.go:133] "Starting certificate poll+watcher" logger="controller-runtime.certwatcher" interval="10s" config/pod/openshift-network-node-identity/logs/network-node-identity-znqwc/approver_previous.log0000640000000000000000000001565615154662741032423 0ustar00000000000000002026-03-13T01:12:49.000218017Z + [[ -f /env/_master ]] 2026-03-13T01:12:49.000652550Z ++ date '+%m%d %H:%M:%S.%N' 2026-03-13T01:12:49.003222112Z + echo 'I0313 01:12:49.002748058 - network-node-identity - start approver' 2026-03-13T01:12:49.003237402Z I0313 01:12:49.002748058 - network-node-identity - start approver 2026-03-13T01:12:49.003283503Z + exec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 --disable-webhook --csr-acceptance-conditions=/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json --loglevel=4 2026-03-13T01:12:49.038264412Z I0313 01:12:49.038138 1 ovnkubeidentity.go:133] Config: {kubeconfig: apiServer:https://api-int.sno.openstack.lab:6443 logLevel:4 port:9443 host:localhost certDir: metricsAddress:0 leaseNamespace: enableInterconnect:false enableHybridOverlay:false disableWebhook:true disableApprover:false waitForKAPIDuration:0 localKAPIPort:6443 extraAllowedUsers:{slice:[] separator:{sep: disabled:false customized:false} hasBeenSet:false keepSpace:false} csrAcceptanceConditionFile:/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json csrAcceptanceConditions:[] podAdmissionConditionFile: podAdmissionConditions:[]} 2026-03-13T01:12:49.038264412Z W0313 01:12:49.038246 1 client_config.go:667] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. 2026-03-13T01:12:49.038851379Z I0313 01:12:49.038814 1 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:12:49.038851379Z I0313 01:12:49.038839 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:12:49.038851379Z I0313 01:12:49.038847 1 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:12:49.038865109Z I0313 01:12:49.038853 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:12:49.038865109Z I0313 01:12:49.038860 1 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:12:49.039500677Z I0313 01:12:49.039470 1 ovnkubeidentity.go:472] Starting certificate signing request approver 2026-03-13T01:12:49.039579489Z I0313 01:12:49.039559 1 leaderelection.go:257] attempting to acquire leader lease openshift-network-node-identity/ovnkube-identity... 2026-03-13T01:12:49.057899582Z I0313 01:12:49.057843 1 leaderelection.go:271] successfully acquired lease openshift-network-node-identity/ovnkube-identity 2026-03-13T01:12:49.059365173Z I0313 01:12:49.059319 1 controller.go:246] "Starting EventSource" controller="certificatesigningrequest" controllerGroup="certificates.k8s.io" controllerKind="CertificateSigningRequest" source="kind source: *v1.CertificateSigningRequest" 2026-03-13T01:12:49.059762124Z I0313 01:12:49.059720 1 recorder.go:104] "master-0_117467dd-4a54-4c62-8054-6bfbc174e777 became leader" logger="events" type="Normal" object={"kind":"Lease","namespace":"openshift-network-node-identity","name":"ovnkube-identity","uid":"fdbdece2-1f4d-4174-8955-474599bca2b6","apiVersion":"coordination.k8s.io/v1","resourceVersion":"3464"} reason="LeaderElection" 2026-03-13T01:12:49.074352372Z I0313 01:12:49.074285 1 reflector.go:357] "Starting reflector" logger="controller-runtime.cache" type="*v1.CertificateSigningRequest" resyncPeriod="9h19m56.045376636s" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" 2026-03-13T01:12:49.074352372Z I0313 01:12:49.074324 1 reflector.go:403] "Listing and watching" logger="controller-runtime.cache" type="*v1.CertificateSigningRequest" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" 2026-03-13T01:12:49.075505435Z I0313 01:12:49.075483 1 reflector.go:430] "Caches populated" logger="controller-runtime.cache" type="*v1.CertificateSigningRequest" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" 2026-03-13T01:12:49.174984349Z I0313 01:12:49.174919 1 controller.go:186] "Starting Controller" controller="certificatesigningrequest" controllerGroup="certificates.k8s.io" controllerKind="CertificateSigningRequest" 2026-03-13T01:12:49.174984349Z I0313 01:12:49.174974 1 controller.go:195] "Starting workers" controller="certificatesigningrequest" controllerGroup="certificates.k8s.io" controllerKind="CertificateSigningRequest" worker count=1 2026-03-13T01:12:56.674214218Z I0313 01:12:56.673997 1 recorder.go:104] "CSR \"csr-sv6nt\" has been approved" logger="events" type="Normal" object={"kind":"CertificateSigningRequest","name":"csr-sv6nt"} reason="CSRApproved" 2026-03-13T01:12:56.684968119Z I0313 01:12:56.681957 1 approver.go:230] Finished syncing CSR csr-sv6nt for master-0 node in 8.537589ms 2026-03-13T01:12:56.684968119Z I0313 01:12:56.682176 1 approver.go:230] Finished syncing CSR csr-sv6nt for unknown node in 97.092µs 2026-03-13T01:12:56.694223558Z I0313 01:12:56.694172 1 approver.go:230] Finished syncing CSR csr-sv6nt for unknown node in 95.783µs 2026-03-13T01:13:02.593509296Z I0313 01:13:02.593416 1 recorder.go:104] "CSR \"csr-w75n4\" has been approved" logger="events" type="Normal" object={"kind":"CertificateSigningRequest","name":"csr-w75n4"} reason="CSRApproved" 2026-03-13T01:13:02.604168384Z I0313 01:13:02.603472 1 approver.go:230] Finished syncing CSR csr-w75n4 for master-0 node in 10.37658ms 2026-03-13T01:13:02.604168384Z I0313 01:13:02.603757 1 approver.go:230] Finished syncing CSR csr-w75n4 for unknown node in 148.634µs 2026-03-13T01:13:02.615957704Z I0313 01:13:02.615491 1 approver.go:230] Finished syncing CSR csr-w75n4 for unknown node in 103.493µs 2026-03-13T01:15:04.546299581Z E0313 01:15:04.546174 1 leaderelection.go:429] Failed to update lock optimistically: Put "https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s": context deadline exceeded, falling back to slow path 2026-03-13T01:15:19.545870330Z E0313 01:15:19.545758 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get "https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s": context deadline exceeded 2026-03-13T01:15:19.545870330Z I0313 01:15:19.545813 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded 2026-03-13T01:15:34.546359151Z E0313 01:15:34.546245 1 leaderelection.go:322] Failed to release lock: Put "https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s": context deadline exceeded 2026-03-13T01:15:34.546359151Z F0313 01:15:34.546336 1 ovnkubeidentity.go:309] error running approver: leader election lost config/pod/openshift-network-node-identity/network-node-identity-znqwc.json0000640000000000000000000002464115154662741026047 0ustar0000000000000000{"metadata":{"name":"network-node-identity-znqwc","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"d1153bb3-30dd-458f-b0a4-c05358a8b3f8","resourceVersion":"9849","creationTimestamp":"2026-03-13T01:12:26Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"68cb6fd5b","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"04c8f0b4-c0c0-4f2e-a88e-fd07e0a5f190","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-srlst","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-srlst","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-srlst","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:12:49Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:12:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:26Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:26Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:12:26Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T01:12:26Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-13T01:15:45Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"t={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-sv6nt\"} reason=\"CSRApproved\"\nI0313 01:12:56.681957 1 approver.go:230] Finished syncing CSR csr-sv6nt for master-0 node in 8.537589ms\nI0313 01:12:56.682176 1 approver.go:230] Finished syncing CSR csr-sv6nt for unknown node in 97.092µs\nI0313 01:12:56.694172 1 approver.go:230] Finished syncing CSR csr-sv6nt for unknown node in 95.783µs\nI0313 01:13:02.593416 1 recorder.go:104] \"CSR \\\"csr-w75n4\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-w75n4\"} reason=\"CSRApproved\"\nI0313 01:13:02.603472 1 approver.go:230] Finished syncing CSR csr-w75n4 for master-0 node in 10.37658ms\nI0313 01:13:02.603757 1 approver.go:230] Finished syncing CSR csr-w75n4 for unknown node in 148.634µs\nI0313 01:13:02.615491 1 approver.go:230] Finished syncing CSR csr-w75n4 for unknown node in 103.493µs\nE0313 01:15:04.546174 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded, falling back to slow path\nE0313 01:15:19.545758 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0313 01:15:19.545813 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0313 01:15:34.546245 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0313 01:15:34.546336 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-13T01:12:48Z","finishedAt":"2026-03-13T01:15:34Z","containerID":"cri-o://8a645f3b183df337e2bb471f99ef18a88ef8e03f78dccc126ecc0415b40abdab"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://99dc9aacbe53f2463fbb1d6c45782c44f72e7b13c67642bb7d0b4839b16638fe","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-srlst","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-13T01:12:48Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://38fb6af13de86e0d88a936d042a22e81831b9af5722fa376d1a0a0fe523b846b","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-srlst","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}network-check-target-container_current.log0000640000000000000000000000005715154662741035555 0ustar0000000000000000config/pod/openshift-network-diagnostics/logs/network-check-target-xs8pt2026-03-13T01:13:25.752642603Z serving on 8080 check-endpoints_current.log0000640000000000000000000000753615154662741034040 0ustar0000000000000000config/pod/openshift-network-diagnostics/logs/network-check-source-7c67b67d47-5fv6h2026-03-13T01:18:14.397825906Z W0313 01:18:14.396896 1 cmd.go:254] Using insecure, self-signed certificates 2026-03-13T01:18:14.829798195Z I0313 01:18:14.829677 1 observer_polling.go:159] Starting file observer 2026-03-13T01:18:14.843416521Z I0313 01:18:14.843246 1 builder.go:298] check-endpoints version 4.18.0-202602132343.p2.gf63a7ff.assembly.stream.el9-f63a7ff-f63a7ffb316c9ca4359210ff5ea2c003dbe2d6a9 2026-03-13T01:18:15.198507289Z I0313 01:18:15.196913 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T01:18:15.198507289Z W0313 01:18:15.196962 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:18:15.198507289Z W0313 01:18:15.196967 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:18:15.198507289Z W0313 01:18:15.196972 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T01:18:15.198507289Z W0313 01:18:15.196975 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T01:18:15.198507289Z W0313 01:18:15.196978 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T01:18:15.198507289Z W0313 01:18:15.196981 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T01:18:15.202070422Z I0313 01:18:15.199601 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-13T01:18:15.202070422Z I0313 01:18:15.199677 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T01:18:15.202070422Z I0313 01:18:15.199695 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T01:18:15.202070422Z I0313 01:18:15.199730 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:18:15.202070422Z I0313 01:18:15.199741 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:18:15.202070422Z I0313 01:18:15.199754 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:18:15.202070422Z I0313 01:18:15.199759 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:18:15.202070422Z I0313 01:18:15.199770 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3299266436/tls.crt::/tmp/serving-cert-3299266436/tls.key" 2026-03-13T01:18:15.202070422Z I0313 01:18:15.199918 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T01:18:15.205133202Z I0313 01:18:15.204838 1 base_controller.go:68] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-13T01:18:15.299937852Z I0313 01:18:15.299872 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:18:15.299937852Z I0313 01:18:15.299933 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T01:18:15.300035554Z I0313 01:18:15.300023 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:18:15.505607161Z I0313 01:18:15.505541 1 base_controller.go:74] Caches are synced for CheckEndpointsTimeToStart 2026-03-13T01:18:15.505607161Z I0313 01:18:15.505564 1 base_controller.go:111] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h.json0000640000000000000000000000651315154662741026515 0ustar0000000000000000{"metadata":{"name":"network-check-source-7c67b67d47-5fv6h","generateName":"network-check-source-7c67b67d47-","namespace":"openshift-network-diagnostics","uid":"48375ae2-d4b4-4db4-b832-3e3db1834fb9","resourceVersion":"3263","creationTimestamp":"2026-03-13T01:12:23Z","labels":{"app":"network-check-source","kubernetes.io/os":"linux","pod-template-hash":"7c67b67d47"},"annotations":{"openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-check-source-7c67b67d47","uid":"0f9d01a2-12ba-415f-8f2c-888746bc76bf","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-q7mn4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"check-endpoints","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","command":["cluster-network-check-endpoints"],"args":["--listen","0.0.0.0:17698","--namespace","$(POD_NAMESPACE)"],"ports":[{"name":"check-endpoints","containerPort":17698,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"kube-api-access-q7mn4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000540000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"network-diagnostics","serviceAccount":"network-diagnostics","securityContext":{"seLinuxOptions":{"level":"s0:c23,c17"},"runAsNonRoot":true,"fsGroup":1000540000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"openshift-user-critical","priority":1000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:12:23Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}config/pod/openshift-ovn-kubernetes/logs/ovnkube-node-v56ct/ovnkube-controller_current.log0000640000000000000000000007027715154662741030667 0ustar00000000000000002026-03-13T01:17:58.518205465Z E0313 01:17:58.518157 5987 metrics.go:168] Failed to get the logfile size for .: stat : no such file or directory 2026-03-13T01:17:59.543194464Z I0313 01:17:59.541352 5987 base_network_controller_pods.go:487] [default/openshift-marketplace/redhat-operators-k52lh] creating logical port openshift-marketplace_redhat-operators-k52lh for pod on switch master-0 2026-03-13T01:17:59.543194464Z I0313 01:17:59.541494 5987 kube.go:320] Updating pod openshift-marketplace/redhat-operators-k52lh 2026-03-13T01:17:59.543194464Z I0313 01:17:59.542283 5987 base_network_controller_pods.go:487] [default/openshift-marketplace/redhat-marketplace-z254g] creating logical port openshift-marketplace_redhat-marketplace-z254g for pod on switch master-0 2026-03-13T01:17:59.543194464Z I0313 01:17:59.542401 5987 kube.go:320] Updating pod openshift-marketplace/redhat-marketplace-z254g 2026-03-13T01:17:59.547046115Z I0313 01:17:59.546586 5987 base_network_controller_pods.go:487] [default/openshift-marketplace/community-operators-bbptx] creating logical port openshift-marketplace_community-operators-bbptx for pod on switch master-0 2026-03-13T01:17:59.547046115Z I0313 01:17:59.546913 5987 kube.go:320] Updating pod openshift-marketplace/community-operators-bbptx 2026-03-13T01:17:59.567896590Z I0313 01:17:59.567007 5987 pod.go:62] [openshift-marketplace/redhat-operators-k52lh] pod update took 25.551999ms 2026-03-13T01:17:59.567896590Z I0313 01:17:59.567044 5987 base_network_controller_pods.go:937] [default/openshift-marketplace/redhat-operators-k52lh] addLogicalPort annotation time took 25.59674ms 2026-03-13T01:17:59.568345932Z I0313 01:17:59.568298 5987 pod.go:62] [openshift-marketplace/redhat-marketplace-z254g] pod update took 25.911937ms 2026-03-13T01:17:59.568439674Z I0313 01:17:59.568409 5987 base_network_controller_pods.go:937] [default/openshift-marketplace/redhat-marketplace-z254g] addLogicalPort annotation time took 26.02067ms 2026-03-13T01:17:59.574839352Z I0313 01:17:59.574233 5987 pod.go:62] [openshift-marketplace/community-operators-bbptx] pod update took 27.387027ms 2026-03-13T01:17:59.574839352Z I0313 01:17:59.574264 5987 base_network_controller_pods.go:937] [default/openshift-marketplace/community-operators-bbptx] addLogicalPort annotation time took 27.428108ms 2026-03-13T01:17:59.618901314Z I0313 01:17:59.618828 5987 pods.go:271] [openshift-marketplace/redhat-operators-k52lh] addLogicalPort took 77.504227ms, libovsdb time 51.127198ms 2026-03-13T01:17:59.619002987Z I0313 01:17:59.618951 5987 pods.go:271] [openshift-marketplace/redhat-marketplace-z254g] addLogicalPort took 76.666605ms, libovsdb time 49.472744ms 2026-03-13T01:17:59.619383517Z I0313 01:17:59.619321 5987 pods.go:271] [openshift-marketplace/community-operators-bbptx] addLogicalPort took 72.769363ms, libovsdb time 44.463473ms 2026-03-13T01:18:00.051138090Z I0313 01:18:00.051056 5987 cni.go:382] [openshift-marketplace/redhat-operators-k52lh 4a7eca1172ea3bfa17610dd111962352ef959bb3d01e721ed6e19fcbca116334 network default NAD default] ADD starting CNI request [openshift-marketplace/redhat-operators-k52lh 4a7eca1172ea3bfa17610dd111962352ef959bb3d01e721ed6e19fcbca116334 network default NAD default] 2026-03-13T01:18:00.073222818Z I0313 01:18:00.073127 5987 helper_linux.go:450] ConfigureOVS: namespace: openshift-marketplace, podName: redhat-operators-k52lh, hostIfaceName: 4a7eca1172ea3bf, network: default, NAD default, SandboxID: "4a7eca1172ea3bfa17610dd111962352ef959bb3d01e721ed6e19fcbca116334", PCI device ID: , UID: "3f9728b4-4e1e-4165-a276-3daa00e95839", MAC: 0a:58:0a:80:00:48, IPs: [10.128.0.72/23] 2026-03-13T01:18:00.085287593Z I0313 01:18:00.085153 5987 cni.go:382] [openshift-marketplace/redhat-marketplace-z254g cb94d42a599d6d70b76d1a519031e7bc4f9c33d2aa5f5a649a375c7a7bded9ac network default NAD default] ADD starting CNI request [openshift-marketplace/redhat-marketplace-z254g cb94d42a599d6d70b76d1a519031e7bc4f9c33d2aa5f5a649a375c7a7bded9ac network default NAD default] 2026-03-13T01:18:00.105031970Z I0313 01:18:00.104953 5987 helper_linux.go:450] ConfigureOVS: namespace: openshift-marketplace, podName: redhat-marketplace-z254g, hostIfaceName: cb94d42a599d6d7, network: default, NAD default, SandboxID: "cb94d42a599d6d70b76d1a519031e7bc4f9c33d2aa5f5a649a375c7a7bded9ac", PCI device ID: , UID: "a9c7c6a4-4f5b-4807-932c-1b0f53ceed22", MAC: 0a:58:0a:80:00:49, IPs: [10.128.0.73/23] 2026-03-13T01:18:00.131207584Z I0313 01:18:00.131140 5987 cni.go:382] [openshift-marketplace/community-operators-bbptx 94e09a1dd75367c606e9c0f6209f6e945683271c1483d15ae30d37382e33a6c7 network default NAD default] ADD starting CNI request [openshift-marketplace/community-operators-bbptx 94e09a1dd75367c606e9c0f6209f6e945683271c1483d15ae30d37382e33a6c7 network default NAD default] 2026-03-13T01:18:00.146554056Z I0313 01:18:00.146466 5987 helper_linux.go:450] ConfigureOVS: namespace: openshift-marketplace, podName: community-operators-bbptx, hostIfaceName: 94e09a1dd75367c, network: default, NAD default, SandboxID: "94e09a1dd75367c606e9c0f6209f6e945683271c1483d15ae30d37382e33a6c7", PCI device ID: , UID: "a561a1d1-b20f-45fd-9e0c-ee4399a1d31b", MAC: 0a:58:0a:80:00:4a, IPs: [10.128.0.74/23] 2026-03-13T01:18:00.378017930Z I0313 01:18:00.377962 5987 cni.go:403] [openshift-marketplace/redhat-operators-k52lh 4a7eca1172ea3bfa17610dd111962352ef959bb3d01e721ed6e19fcbca116334 network default NAD default] ADD finished CNI request [openshift-marketplace/redhat-operators-k52lh 4a7eca1172ea3bfa17610dd111962352ef959bb3d01e721ed6e19fcbca116334 network default NAD default], result "{\"interfaces\":[{\"mac\":\"86:03:03:e5:77:d5\",\"name\":\"4a7eca1172ea3bf\"},{\"mac\":\"0a:58:0a:80:00:48\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/a48305ec-ee49-4a4b-bf39-60e2fe8ccf45\"}],\"ips\":[{\"address\":\"10.128.0.72/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}", err 2026-03-13T01:18:00.455692541Z I0313 01:18:00.454677 5987 cni.go:403] [openshift-marketplace/redhat-marketplace-z254g cb94d42a599d6d70b76d1a519031e7bc4f9c33d2aa5f5a649a375c7a7bded9ac network default NAD default] ADD finished CNI request [openshift-marketplace/redhat-marketplace-z254g cb94d42a599d6d70b76d1a519031e7bc4f9c33d2aa5f5a649a375c7a7bded9ac network default NAD default], result "{\"interfaces\":[{\"mac\":\"a2:d4:31:f5:93:bb\",\"name\":\"cb94d42a599d6d7\"},{\"mac\":\"0a:58:0a:80:00:49\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/5c33a26e-0acb-430d-a4cf-02f4719b0af8\"}],\"ips\":[{\"address\":\"10.128.0.73/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}", err 2026-03-13T01:18:00.456449681Z I0313 01:18:00.456403 5987 cni.go:403] [openshift-marketplace/community-operators-bbptx 94e09a1dd75367c606e9c0f6209f6e945683271c1483d15ae30d37382e33a6c7 network default NAD default] ADD finished CNI request [openshift-marketplace/community-operators-bbptx 94e09a1dd75367c606e9c0f6209f6e945683271c1483d15ae30d37382e33a6c7 network default NAD default], result "{\"interfaces\":[{\"mac\":\"ba:74:3f:31:05:8e\",\"name\":\"94e09a1dd75367c\"},{\"mac\":\"0a:58:0a:80:00:4a\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/571631ea-df7b-4b00-a4fc-c14187ed1474\"}],\"ips\":[{\"address\":\"10.128.0.74/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}", err 2026-03-13T01:18:01.872911939Z I0313 01:18:01.872171 5987 reflector.go:946] "Watch close" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" totalItems=17 2026-03-13T01:18:06.797656338Z W0313 01:18:06.797594 5987 util.go:862] Failed to build global endpoints for port TCP/grpc: empty IP address endpoints for service openshift-marketplace/redhat-marketplace 2026-03-13T01:18:06.819769527Z W0313 01:18:06.819729 5987 util.go:862] Failed to build global endpoints for port TCP/grpc: empty IP address endpoints for service openshift-marketplace/community-operators 2026-03-13T01:18:06.819856139Z W0313 01:18:06.819737 5987 util.go:951] Failed to build node endpoints for node master-0 port 50051: empty IP address endpoints for service openshift-marketplace/community-operators 2026-03-13T01:18:06.820233279Z W0313 01:18:06.820192 5987 util.go:951] Failed to build node endpoints for node master-0 port 8443: empty IP address endpoints for service openshift-operator-lifecycle-manager/package-server-manager-metrics 2026-03-13T01:18:06.820457975Z W0313 01:18:06.820444 5987 util.go:862] Failed to build global endpoints for port TCP/grpc: empty IP address endpoints for service openshift-marketplace/redhat-operators 2026-03-13T01:18:06.830950019Z W0313 01:18:06.830904 5987 util.go:951] Failed to build node endpoints for node master-0 port 50051: empty IP address endpoints for service openshift-marketplace/community-operators 2026-03-13T01:18:06.831141474Z W0313 01:18:06.831127 5987 util.go:862] Failed to build global endpoints for port TCP/grpc: empty IP address endpoints for service openshift-marketplace/community-operators 2026-03-13T01:18:06.955612170Z W0313 01:18:06.955175 5987 util.go:862] Failed to build global endpoints for port TCP/health: empty IP address endpoints for service openshift-machine-config-operator/machine-config-daemon 2026-03-13T01:18:06.955612170Z W0313 01:18:06.955196 5987 util.go:862] Failed to build global endpoints for port TCP/metrics: empty IP address endpoints for service openshift-machine-config-operator/machine-config-daemon 2026-03-13T01:18:06.974184976Z I0313 01:18:06.974138 5987 base_network_controller_pods.go:487] [default/openshift-multus/multus-admission-controller-7769569c45-zm2jl] creating logical port openshift-multus_multus-admission-controller-7769569c45-zm2jl for pod on switch master-0 2026-03-13T01:18:06.976079255Z I0313 01:18:06.974280 5987 kube.go:320] Updating pod openshift-multus/multus-admission-controller-7769569c45-zm2jl 2026-03-13T01:18:06.998618665Z I0313 01:18:06.997810 5987 pod.go:62] [openshift-multus/multus-admission-controller-7769569c45-zm2jl] pod update took 23.554896ms 2026-03-13T01:18:06.998618665Z I0313 01:18:06.997841 5987 base_network_controller_pods.go:937] [default/openshift-multus/multus-admission-controller-7769569c45-zm2jl] addLogicalPort annotation time took 23.594587ms 2026-03-13T01:18:07.044305250Z I0313 01:18:07.042455 5987 pods.go:271] [openshift-multus/multus-admission-controller-7769569c45-zm2jl] addLogicalPort took 68.335747ms, libovsdb time 44.112714ms 2026-03-13T01:18:07.129948650Z I0313 01:18:07.129894 5987 obj_retry.go:463] Detected object openshift-cluster-machine-approver/machine-approver-955fcfb87-jvdz8 of type *v1.Pod in terminal state (e.g. completed) during update event: will remove it 2026-03-13T01:18:07.129948650Z I0313 01:18:07.129931 5987 obj_retry.go:463] Detected object openshift-cluster-machine-approver/machine-approver-955fcfb87-jvdz8 of type *factory.egressIPPod in terminal state (e.g. completed) during update event: will remove it 2026-03-13T01:18:07.754769962Z I0313 01:18:07.754620 5987 base_network_controller_pods.go:487] [default/openshift-machine-api/machine-api-operator-84bf6db4f9-zt229] creating logical port openshift-machine-api_machine-api-operator-84bf6db4f9-zt229 for pod on switch master-0 2026-03-13T01:18:07.754854705Z I0313 01:18:07.754819 5987 kube.go:320] Updating pod openshift-machine-api/machine-api-operator-84bf6db4f9-zt229 2026-03-13T01:18:07.781602754Z I0313 01:18:07.779090 5987 pod.go:62] [openshift-machine-api/machine-api-operator-84bf6db4f9-zt229] pod update took 24.314866ms 2026-03-13T01:18:07.781602754Z I0313 01:18:07.779127 5987 base_network_controller_pods.go:937] [default/openshift-machine-api/machine-api-operator-84bf6db4f9-zt229] addLogicalPort annotation time took 24.364607ms 2026-03-13T01:18:07.783006271Z I0313 01:18:07.782762 5987 pods.go:271] [openshift-machine-api/machine-api-operator-84bf6db4f9-zt229] addLogicalPort took 28.162986ms, libovsdb time 1.578481ms 2026-03-13T01:18:07.848491624Z I0313 01:18:07.848401 5987 cni.go:382] [openshift-multus/multus-admission-controller-7769569c45-zm2jl 3ac90b7e141885c73870d9744a9126cb8648da1eed1822b13844b812ecb6dc82 network default NAD default] ADD starting CNI request [openshift-multus/multus-admission-controller-7769569c45-zm2jl 3ac90b7e141885c73870d9744a9126cb8648da1eed1822b13844b812ecb6dc82 network default NAD default] 2026-03-13T01:18:07.865735635Z I0313 01:18:07.865596 5987 helper_linux.go:450] ConfigureOVS: namespace: openshift-multus, podName: multus-admission-controller-7769569c45-zm2jl, hostIfaceName: 3ac90b7e141885c, network: default, NAD default, SandboxID: "3ac90b7e141885c73870d9744a9126cb8648da1eed1822b13844b812ecb6dc82", PCI device ID: , UID: "2679c6e1-11c1-450c-b03a-30d7ee59ff6f", MAC: 0a:58:0a:80:00:4b, IPs: [10.128.0.75/23] 2026-03-13T01:18:08.032887497Z W0313 01:18:08.032692 5987 util.go:951] Failed to build node endpoints for node master-0 port 8798: empty IP address endpoints for service openshift-machine-config-operator/machine-config-daemon 2026-03-13T01:18:08.032887497Z W0313 01:18:08.032714 5987 util.go:951] Failed to build node endpoints for node master-0 port 9001: empty IP address endpoints for service openshift-machine-config-operator/machine-config-daemon 2026-03-13T01:18:08.040743002Z I0313 01:18:08.040693 5987 obj_retry.go:457] Detected object openshift-cluster-machine-approver/machine-approver-955fcfb87-jvdz8 of type *v1.Pod in terminal state (e.g. completed) will be ignored as it has already been processed 2026-03-13T01:18:08.040811064Z I0313 01:18:08.040796 5987 obj_retry.go:457] Detected object openshift-cluster-machine-approver/machine-approver-955fcfb87-jvdz8 of type *factory.egressIPPod in terminal state (e.g. completed) will be ignored as it has already been processed 2026-03-13T01:18:08.046220266Z I0313 01:18:08.046177 5987 obj_retry.go:736] Ignoring delete event for resource in terminal state *factory.egressIPPod openshift-cluster-machine-approver/machine-approver-955fcfb87-jvdz8 2026-03-13T01:18:08.046274417Z I0313 01:18:08.046264 5987 obj_retry.go:736] Ignoring delete event for resource in terminal state *v1.Pod openshift-cluster-machine-approver/machine-approver-955fcfb87-jvdz8 2026-03-13T01:18:08.171963334Z I0313 01:18:08.170858 5987 cni.go:403] [openshift-multus/multus-admission-controller-7769569c45-zm2jl 3ac90b7e141885c73870d9744a9126cb8648da1eed1822b13844b812ecb6dc82 network default NAD default] ADD finished CNI request [openshift-multus/multus-admission-controller-7769569c45-zm2jl 3ac90b7e141885c73870d9744a9126cb8648da1eed1822b13844b812ecb6dc82 network default NAD default], result "{\"interfaces\":[{\"mac\":\"7a:22:b5:74:95:52\",\"name\":\"3ac90b7e141885c\"},{\"mac\":\"0a:58:0a:80:00:4b\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/b97f49fb-a8cb-4738-86e0-6b468a89c08b\"}],\"ips\":[{\"address\":\"10.128.0.75/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}", err 2026-03-13T01:18:08.225372291Z I0313 01:18:08.225306 5987 cni.go:382] [openshift-machine-api/machine-api-operator-84bf6db4f9-zt229 c50effcf2f5fc891493cebf4edbffd60b3e47884c10225842c0382c940f83e36 network default NAD default] ADD starting CNI request [openshift-machine-api/machine-api-operator-84bf6db4f9-zt229 c50effcf2f5fc891493cebf4edbffd60b3e47884c10225842c0382c940f83e36 network default NAD default] 2026-03-13T01:18:08.239639105Z I0313 01:18:08.239563 5987 helper_linux.go:450] ConfigureOVS: namespace: openshift-machine-api, podName: machine-api-operator-84bf6db4f9-zt229, hostIfaceName: c50effcf2f5fc89, network: default, NAD default, SandboxID: "c50effcf2f5fc891493cebf4edbffd60b3e47884c10225842c0382c940f83e36", PCI device ID: , UID: "1c24e17c-8bd9-4c23-9876-6f31c9da5cd1", MAC: 0a:58:0a:80:00:4c, IPs: [10.128.0.76/23] 2026-03-13T01:18:08.516870406Z I0313 01:18:08.516795 5987 cni.go:403] [openshift-machine-api/machine-api-operator-84bf6db4f9-zt229 c50effcf2f5fc891493cebf4edbffd60b3e47884c10225842c0382c940f83e36 network default NAD default] ADD finished CNI request [openshift-machine-api/machine-api-operator-84bf6db4f9-zt229 c50effcf2f5fc891493cebf4edbffd60b3e47884c10225842c0382c940f83e36 network default NAD default], result "{\"interfaces\":[{\"mac\":\"52:62:52:25:a9:7b\",\"name\":\"c50effcf2f5fc89\"},{\"mac\":\"0a:58:0a:80:00:4c\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/e1caf67d-6f29-4a99-a55f-d26869cc5e44\"}],\"ips\":[{\"address\":\"10.128.0.76/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}", err 2026-03-13T01:18:09.631827357Z I0313 01:18:09.631691 5987 base_network_controller_pods.go:487] [default/openshift-kube-apiserver/installer-1-retry-1-master-0] creating logical port openshift-kube-apiserver_installer-1-retry-1-master-0 for pod on switch master-0 2026-03-13T01:18:09.631874859Z I0313 01:18:09.631848 5987 kube.go:320] Updating pod openshift-kube-apiserver/installer-1-retry-1-master-0 2026-03-13T01:18:09.646339357Z I0313 01:18:09.643019 5987 pod.go:62] [openshift-kube-apiserver/installer-1-retry-1-master-0] pod update took 11.197453ms 2026-03-13T01:18:09.646339357Z I0313 01:18:09.643046 5987 base_network_controller_pods.go:937] [default/openshift-kube-apiserver/installer-1-retry-1-master-0] addLogicalPort annotation time took 11.232464ms 2026-03-13T01:18:09.697363191Z I0313 01:18:09.697304 5987 pods.go:271] [openshift-kube-apiserver/installer-1-retry-1-master-0] addLogicalPort took 65.634726ms, libovsdb time 53.769456ms 2026-03-13T01:18:10.106204015Z W0313 01:18:10.105995 5987 util.go:951] Failed to build node endpoints for node master-0 port 50051: empty IP address endpoints for service openshift-marketplace/redhat-marketplace 2026-03-13T01:18:11.143132357Z W0313 01:18:11.142847 5987 util.go:951] Failed to build node endpoints for node master-0 port 50051: empty IP address endpoints for service openshift-marketplace/community-operators 2026-03-13T01:18:11.289286669Z I0313 01:18:11.289156 5987 base_network_controller_pods.go:487] [default/openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh] creating logical port openshift-machine-config-operator_machine-config-controller-ff46b7bdf-g7wfh for pod on switch master-0 2026-03-13T01:18:11.289331191Z I0313 01:18:11.289306 5987 kube.go:320] Updating pod openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh 2026-03-13T01:18:11.306730456Z I0313 01:18:11.303904 5987 pod.go:62] [openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh] pod update took 14.645223ms 2026-03-13T01:18:11.306730456Z I0313 01:18:11.303948 5987 base_network_controller_pods.go:937] [default/openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh] addLogicalPort annotation time took 14.691484ms 2026-03-13T01:18:11.310656858Z I0313 01:18:11.307899 5987 pods.go:271] [openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh] addLogicalPort took 18.766201ms, libovsdb time 3.357558ms 2026-03-13T01:18:11.607541594Z I0313 01:18:11.607481 5987 cni.go:382] [openshift-kube-apiserver/installer-1-retry-1-master-0 e1a9f8a9b9f4f12cdb02f0899fd6c6ca89ad08ee7dce767d1b7f5c4f67fb87f9 network default NAD default] ADD starting CNI request [openshift-kube-apiserver/installer-1-retry-1-master-0 e1a9f8a9b9f4f12cdb02f0899fd6c6ca89ad08ee7dce767d1b7f5c4f67fb87f9 network default NAD default] 2026-03-13T01:18:11.633179895Z I0313 01:18:11.633112 5987 helper_linux.go:450] ConfigureOVS: namespace: openshift-kube-apiserver, podName: installer-1-retry-1-master-0, hostIfaceName: e1a9f8a9b9f4f12, network: default, NAD default, SandboxID: "e1a9f8a9b9f4f12cdb02f0899fd6c6ca89ad08ee7dce767d1b7f5c4f67fb87f9", PCI device ID: , UID: "690f916b-6f87-42d9-8168-392a9177bee9", MAC: 0a:58:0a:80:00:4d, IPs: [10.128.0.77/23] 2026-03-13T01:18:11.692465645Z I0313 01:18:11.692420 5987 cni.go:382] [openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh 4a82c4d1f4dd0703b5ca166acc233f980e0154f3140fea6bcb51b2baef68cc9c network default NAD default] ADD starting CNI request [openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh 4a82c4d1f4dd0703b5ca166acc233f980e0154f3140fea6bcb51b2baef68cc9c network default NAD default] 2026-03-13T01:18:11.706155323Z I0313 01:18:11.706108 5987 helper_linux.go:450] ConfigureOVS: namespace: openshift-machine-config-operator, podName: machine-config-controller-ff46b7bdf-g7wfh, hostIfaceName: 4a82c4d1f4dd070, network: default, NAD default, SandboxID: "4a82c4d1f4dd0703b5ca166acc233f980e0154f3140fea6bcb51b2baef68cc9c", PCI device ID: , UID: "93871019-3d0c-4081-9afe-19b6dd108ec6", MAC: 0a:58:0a:80:00:4e, IPs: [10.128.0.78/23] 2026-03-13T01:18:11.951363567Z I0313 01:18:11.951266 5987 cni.go:403] [openshift-kube-apiserver/installer-1-retry-1-master-0 e1a9f8a9b9f4f12cdb02f0899fd6c6ca89ad08ee7dce767d1b7f5c4f67fb87f9 network default NAD default] ADD finished CNI request [openshift-kube-apiserver/installer-1-retry-1-master-0 e1a9f8a9b9f4f12cdb02f0899fd6c6ca89ad08ee7dce767d1b7f5c4f67fb87f9 network default NAD default], result "{\"interfaces\":[{\"mac\":\"c2:d4:47:97:40:e7\",\"name\":\"e1a9f8a9b9f4f12\"},{\"mac\":\"0a:58:0a:80:00:4d\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/57dcc7ba-6a6c-4597-8fd2-d2d755455359\"}],\"ips\":[{\"address\":\"10.128.0.77/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}", err 2026-03-13T01:18:12.001873768Z I0313 01:18:12.001806 5987 cni.go:403] [openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh 4a82c4d1f4dd0703b5ca166acc233f980e0154f3140fea6bcb51b2baef68cc9c network default NAD default] ADD finished CNI request [openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh 4a82c4d1f4dd0703b5ca166acc233f980e0154f3140fea6bcb51b2baef68cc9c network default NAD default], result "{\"interfaces\":[{\"mac\":\"4a:ba:79:90:39:9e\",\"name\":\"4a82c4d1f4dd070\"},{\"mac\":\"0a:58:0a:80:00:4e\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/24156eb1-cb29-4b05-b628-17c5e9e24cb0\"}],\"ips\":[{\"address\":\"10.128.0.78/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}", err 2026-03-13T01:18:12.261590142Z I0313 01:18:12.261190 5987 egressservice_zone_node.go:111] Processing sync for Egress Service node master-0 2026-03-13T01:18:12.261590142Z I0313 01:18:12.261226 5987 egressservice_zone_node.go:114] Finished syncing Egress Service node master-0: 43.271µs 2026-03-13T01:18:12.272366744Z I0313 01:18:12.269792 5987 base_network_controller_pods.go:487] [default/openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg] creating logical port openshift-monitoring_prometheus-operator-admission-webhook-8464df8497-kjwgg for pod on switch master-0 2026-03-13T01:18:12.272366744Z I0313 01:18:12.269990 5987 kube.go:320] Updating pod openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg 2026-03-13T01:18:12.272366744Z I0313 01:18:12.271026 5987 base_network_controller_pods.go:487] [default/openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h] creating logical port openshift-network-diagnostics_network-check-source-7c67b67d47-5fv6h for pod on switch master-0 2026-03-13T01:18:12.272366744Z I0313 01:18:12.271206 5987 kube.go:320] Updating pod openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h 2026-03-13T01:18:12.295801236Z I0313 01:18:12.295719 5987 pod.go:62] [openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h] pod update took 24.539792ms 2026-03-13T01:18:12.295801236Z I0313 01:18:12.295761 5987 base_network_controller_pods.go:937] [default/openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h] addLogicalPort annotation time took 24.589513ms 2026-03-13T01:18:12.296235448Z I0313 01:18:12.296024 5987 pod.go:62] [openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg] pod update took 26.060672ms 2026-03-13T01:18:12.296277509Z I0313 01:18:12.296231 5987 base_network_controller_pods.go:937] [default/openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg] addLogicalPort annotation time took 26.275257ms 2026-03-13T01:18:12.300183451Z I0313 01:18:12.297869 5987 pods.go:271] [openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h] addLogicalPort took 26.866242ms, libovsdb time 1.473359ms 2026-03-13T01:18:12.313094539Z I0313 01:18:12.303194 5987 pods.go:271] [openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg] addLogicalPort took 33.426365ms, libovsdb time 6.235033ms 2026-03-13T01:18:12.657337562Z W0313 01:18:12.654973 5987 util.go:862] Failed to build global endpoints for port TCP/http: empty IP address endpoints for service openshift-ingress/router-internal-default 2026-03-13T01:18:12.657337562Z W0313 01:18:12.654998 5987 util.go:862] Failed to build global endpoints for port TCP/metrics: empty IP address endpoints for service openshift-ingress/router-internal-default 2026-03-13T01:18:12.657337562Z W0313 01:18:12.655005 5987 util.go:862] Failed to build global endpoints for port TCP/https: empty IP address endpoints for service openshift-ingress/router-internal-default 2026-03-13T01:18:12.749374739Z I0313 01:18:12.749310 5987 cni.go:382] [openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg 5f0a23a29ec1be227442f950c7b43af141e31a2152ab46cc286a5229950b1bae network default NAD default] ADD starting CNI request [openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg 5f0a23a29ec1be227442f950c7b43af141e31a2152ab46cc286a5229950b1bae network default NAD default] 2026-03-13T01:18:12.762888043Z I0313 01:18:12.762825 5987 helper_linux.go:450] ConfigureOVS: namespace: openshift-monitoring, podName: prometheus-operator-admission-webhook-8464df8497-kjwgg, hostIfaceName: 5f0a23a29ec1be2, network: default, NAD default, SandboxID: "5f0a23a29ec1be227442f950c7b43af141e31a2152ab46cc286a5229950b1bae", PCI device ID: , UID: "4d313ee4-3bb9-44a9-ad80-8e00540ef1e7", MAC: 0a:58:0a:80:00:4f, IPs: [10.128.0.79/23] 2026-03-13T01:18:13.099905758Z I0313 01:18:13.056412 5987 cni.go:382] [openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h 19ce38027ae9e3d0076b8c83191fabde1e4e81b393c760835578ba3bc36b41b2 network default NAD default] ADD starting CNI request [openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h 19ce38027ae9e3d0076b8c83191fabde1e4e81b393c760835578ba3bc36b41b2 network default NAD default] 2026-03-13T01:18:13.106903341Z I0313 01:18:13.106840 5987 cni.go:403] [openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg 5f0a23a29ec1be227442f950c7b43af141e31a2152ab46cc286a5229950b1bae network default NAD default] ADD finished CNI request [openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg 5f0a23a29ec1be227442f950c7b43af141e31a2152ab46cc286a5229950b1bae network default NAD default], result "{\"interfaces\":[{\"mac\":\"8e:18:cd:2c:16:42\",\"name\":\"5f0a23a29ec1be2\"},{\"mac\":\"0a:58:0a:80:00:4f\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/4fb4a7a7-6ea8-487f-899e-78d26113df0f\"}],\"ips\":[{\"address\":\"10.128.0.79/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}", err 2026-03-13T01:18:13.114398297Z I0313 01:18:13.114320 5987 helper_linux.go:450] ConfigureOVS: namespace: openshift-network-diagnostics, podName: network-check-source-7c67b67d47-5fv6h, hostIfaceName: 19ce38027ae9e3d, network: default, NAD default, SandboxID: "19ce38027ae9e3d0076b8c83191fabde1e4e81b393c760835578ba3bc36b41b2", PCI device ID: , UID: "48375ae2-d4b4-4db4-b832-3e3db1834fb9", MAC: 0a:58:0a:80:00:50, IPs: [10.128.0.80/23] 2026-03-13T01:18:13.406869477Z I0313 01:18:13.406741 5987 cni.go:403] [openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h 19ce38027ae9e3d0076b8c83191fabde1e4e81b393c760835578ba3bc36b41b2 network default NAD default] ADD finished CNI request [openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h 19ce38027ae9e3d0076b8c83191fabde1e4e81b393c760835578ba3bc36b41b2 network default NAD default], result "{\"interfaces\":[{\"mac\":\"8a:e3:01:c7:7f:fc\",\"name\":\"19ce38027ae9e3d\"},{\"mac\":\"0a:58:0a:80:00:50\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/570765aa-c510-4bfa-b473-c271abc5e3ae\"}],\"ips\":[{\"address\":\"10.128.0.80/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}", err 2026-03-13T01:18:17.228269008Z W0313 01:18:17.227927 5987 util.go:862] Failed to build global endpoints for port TCP/http: empty IP address endpoints for service openshift-machine-config-operator/machine-config-server 2026-03-13T01:18:17.228269008Z W0313 01:18:17.227981 5987 util.go:862] Failed to build global endpoints for port TCP/https: empty IP address endpoints for service openshift-machine-config-operator/machine-config-server config/pod/openshift-ovn-kubernetes/logs/ovnkube-node-v56ct/sbdb_current.log0000640000000000000000000000416415154662741025737 0ustar00000000000000002026-03-13T01:12:54.170571605Z + [[ -f /env/_master ]] 2026-03-13T01:12:54.170571605Z + . /ovnkube-lib/ovnkube-lib.sh 2026-03-13T01:12:54.170899715Z ++ set -x 2026-03-13T01:12:54.170899715Z ++ K8S_NODE= 2026-03-13T01:12:54.170899715Z ++ [[ -n '' ]] 2026-03-13T01:12:54.170899715Z ++ northd_pidfile=/var/run/ovn/ovn-northd.pid 2026-03-13T01:12:54.170899715Z ++ controller_pidfile=/var/run/ovn/ovn-controller.pid 2026-03-13T01:12:54.170899715Z ++ controller_logfile=/var/log/ovn/acl-audit-log.log 2026-03-13T01:12:54.170899715Z ++ vswitch_dbsock=/var/run/openvswitch/db.sock 2026-03-13T01:12:54.170899715Z ++ nbdb_pidfile=/var/run/ovn/ovnnb_db.pid 2026-03-13T01:12:54.170899715Z ++ nbdb_sock=/var/run/ovn/ovnnb_db.sock 2026-03-13T01:12:54.170899715Z ++ nbdb_ctl=/var/run/ovn/ovnnb_db.ctl 2026-03-13T01:12:54.170899715Z ++ sbdb_pidfile=/var/run/ovn/ovnsb_db.pid 2026-03-13T01:12:54.170899715Z ++ sbdb_sock=/var/run/ovn/ovnsb_db.sock 2026-03-13T01:12:54.170899715Z ++ sbdb_ctl=/var/run/ovn/ovnsb_db.ctl 2026-03-13T01:12:54.172990043Z + trap quit-sbdb TERM INT 2026-03-13T01:12:54.172990043Z + start-sbdb info 2026-03-13T01:12:54.173033994Z + local log_level=info 2026-03-13T01:12:54.173033994Z + [[ 1 -ne 1 ]] 2026-03-13T01:12:54.173420445Z + wait 5890 2026-03-13T01:12:54.173627181Z + exec /usr/share/ovn/scripts/ovn-ctl --no-monitor --db-sb-sock=/var/run/ovn/ovnsb_db.sock '--ovn-sb-log=-vconsole:info -vfile:off -vPATTERN:console:%D{%Y-%m-%dT%H:%M:%S.###Z}|%05N|%c%T|%p|%m' run_sb_ovsdb 2026-03-13T01:12:54.292171649Z /etc/ovn/ovnsb_db.db does not exist ... (warning). 2026-03-13T01:12:54.315703057Z Creating empty database /etc/ovn/ovnsb_db.db. 2026-03-13T01:12:54.363149615Z 2026-03-13T01:12:54.362Z|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log 2026-03-13T01:12:54.373211697Z 2026-03-13T01:12:54.373Z|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.5.2-51.el9fdp 2026-03-13T01:13:04.378698160Z 2026-03-13T01:13:04.378Z|00003|memory|INFO|18304 kB peak resident set size after 10.0 seconds 2026-03-13T01:13:04.378994018Z 2026-03-13T01:13:04.378Z|00004|memory|INFO|atoms:10687 cells:10344 json-caches:2 monitors:5 n-weak-refs:85 sessions:3 config/pod/openshift-ovn-kubernetes/logs/ovnkube-node-v56ct/nbdb_current.log0000640000000000000000000000427115154662741025731 0ustar00000000000000002026-03-13T01:12:51.755469053Z + [[ -f /env/_master ]] 2026-03-13T01:12:51.755469053Z + . /ovnkube-lib/ovnkube-lib.sh 2026-03-13T01:12:51.755469053Z ++ set -x 2026-03-13T01:12:51.755693660Z ++ K8S_NODE=master-0 2026-03-13T01:12:51.755693660Z ++ [[ -n master-0 ]] 2026-03-13T01:12:51.755693660Z ++ [[ -f /env/master-0 ]] 2026-03-13T01:12:51.755693660Z ++ northd_pidfile=/var/run/ovn/ovn-northd.pid 2026-03-13T01:12:51.755693660Z ++ controller_pidfile=/var/run/ovn/ovn-controller.pid 2026-03-13T01:12:51.755693660Z ++ controller_logfile=/var/log/ovn/acl-audit-log.log 2026-03-13T01:12:51.755693660Z ++ vswitch_dbsock=/var/run/openvswitch/db.sock 2026-03-13T01:12:51.755693660Z ++ nbdb_pidfile=/var/run/ovn/ovnnb_db.pid 2026-03-13T01:12:51.755693660Z ++ nbdb_sock=/var/run/ovn/ovnnb_db.sock 2026-03-13T01:12:51.755693660Z ++ nbdb_ctl=/var/run/ovn/ovnnb_db.ctl 2026-03-13T01:12:51.755693660Z ++ sbdb_pidfile=/var/run/ovn/ovnsb_db.pid 2026-03-13T01:12:51.755693660Z ++ sbdb_sock=/var/run/ovn/ovnsb_db.sock 2026-03-13T01:12:51.755693660Z ++ sbdb_ctl=/var/run/ovn/ovnsb_db.ctl 2026-03-13T01:12:51.757055068Z + trap quit-nbdb TERM INT 2026-03-13T01:12:51.757055068Z + start-nbdb info 2026-03-13T01:12:51.757076318Z + local log_level=info 2026-03-13T01:12:51.757076318Z + [[ 1 -ne 1 ]] 2026-03-13T01:12:51.757483620Z + wait 5827 2026-03-13T01:12:51.757922392Z + exec /usr/share/ovn/scripts/ovn-ctl --no-monitor --db-nb-sock=/var/run/ovn/ovnnb_db.sock '--ovn-nb-log=-vconsole:info -vfile:off -vPATTERN:console:%D{%Y-%m-%dT%H:%M:%S.###Z}|%05N|%c%T|%p|%m' run_nb_ovsdb 2026-03-13T01:12:51.856598034Z /etc/ovn/ovnnb_db.db does not exist ... (warning). 2026-03-13T01:12:51.879727011Z Creating empty database /etc/ovn/ovnnb_db.db. 2026-03-13T01:12:51.925929654Z 2026-03-13T01:12:51.925Z|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log 2026-03-13T01:12:51.936597133Z 2026-03-13T01:12:51.936Z|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.5.2-51.el9fdp 2026-03-13T01:13:01.941533528Z 2026-03-13T01:13:01.941Z|00003|memory|INFO|12416 kB peak resident set size after 10.0 seconds 2026-03-13T01:13:01.941716793Z 2026-03-13T01:13:01.941Z|00004|memory|INFO|atoms:3379 cells:2070 json-caches:2 monitors:4 n-weak-refs:43 sessions:2 config/pod/openshift-ovn-kubernetes/logs/ovnkube-node-v56ct/northd_current.log0000640000000000000000000001122415154662741026316 0ustar00000000000000002026-03-13T01:12:51.643247022Z + [[ -f /env/_master ]] 2026-03-13T01:12:51.643247022Z + . /ovnkube-lib/ovnkube-lib.sh 2026-03-13T01:12:51.643435938Z ++ set -x 2026-03-13T01:12:51.643435938Z ++ K8S_NODE= 2026-03-13T01:12:51.643435938Z ++ [[ -n '' ]] 2026-03-13T01:12:51.643435938Z ++ northd_pidfile=/var/run/ovn/ovn-northd.pid 2026-03-13T01:12:51.643435938Z ++ controller_pidfile=/var/run/ovn/ovn-controller.pid 2026-03-13T01:12:51.643435938Z ++ controller_logfile=/var/log/ovn/acl-audit-log.log 2026-03-13T01:12:51.643435938Z ++ vswitch_dbsock=/var/run/openvswitch/db.sock 2026-03-13T01:12:51.643435938Z ++ nbdb_pidfile=/var/run/ovn/ovnnb_db.pid 2026-03-13T01:12:51.643435938Z ++ nbdb_sock=/var/run/ovn/ovnnb_db.sock 2026-03-13T01:12:51.643453258Z ++ nbdb_ctl=/var/run/ovn/ovnnb_db.ctl 2026-03-13T01:12:51.643453258Z ++ sbdb_pidfile=/var/run/ovn/ovnsb_db.pid 2026-03-13T01:12:51.643464979Z ++ sbdb_sock=/var/run/ovn/ovnsb_db.sock 2026-03-13T01:12:51.643475639Z ++ sbdb_ctl=/var/run/ovn/ovnsb_db.ctl 2026-03-13T01:12:51.645676180Z + trap quit-ovn-northd TERM INT 2026-03-13T01:12:51.645700931Z + start-ovn-northd info 2026-03-13T01:12:51.645732762Z + local log_level=info 2026-03-13T01:12:51.645743472Z + [[ 1 -ne 1 ]] 2026-03-13T01:12:51.646624747Z ++ date -Iseconds 2026-03-13T01:12:51.651202275Z + echo '2026-03-13T01:12:51+00:00 - starting ovn-northd' 2026-03-13T01:12:51.651278947Z 2026-03-13T01:12:51+00:00 - starting ovn-northd 2026-03-13T01:12:51.651744360Z + wait 5817 2026-03-13T01:12:51.652091310Z + exec ovn-northd --no-chdir -vconsole:info -vfile:off '-vPATTERN:console:%D{%Y-%m-%dT%H:%M:%S.###Z}|%05N|%c%T|%p|%m' --pidfile /var/run/ovn/ovn-northd.pid --n-threads=1 2026-03-13T01:12:51.661250106Z 2026-03-13T01:12:51.661Z|00001|ovn_northd|INFO|OVN internal version is : [25.03.3-20.41.0-78.8] 2026-03-13T01:12:51.661974697Z 2026-03-13T01:12:51.661Z|00002|reconnect|INFO|unix:/var/run/ovn/ovnnb_db.sock: connecting... 2026-03-13T01:12:51.661974697Z 2026-03-13T01:12:51.661Z|00003|reconnect|INFO|unix:/var/run/ovn/ovnnb_db.sock: connection attempt failed (No such file or directory) 2026-03-13T01:12:51.662014658Z 2026-03-13T01:12:51.661Z|00004|ovn_northd|INFO|OVN NB IDL reconnected, force recompute. 2026-03-13T01:12:51.662156722Z 2026-03-13T01:12:51.662Z|00005|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: connecting... 2026-03-13T01:12:51.662176352Z 2026-03-13T01:12:51.662Z|00006|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: connection attempt failed (No such file or directory) 2026-03-13T01:12:51.662239344Z 2026-03-13T01:12:51.662Z|00007|ovn_northd|INFO|OVN SB IDL reconnected, force recompute. 2026-03-13T01:12:52.663807576Z 2026-03-13T01:12:52.663Z|00008|reconnect|INFO|unix:/var/run/ovn/ovnnb_db.sock: connecting... 2026-03-13T01:12:52.663807576Z 2026-03-13T01:12:52.663Z|00009|reconnect|INFO|unix:/var/run/ovn/ovnnb_db.sock: connected 2026-03-13T01:12:52.663807576Z 2026-03-13T01:12:52.663Z|00010|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: connecting... 2026-03-13T01:12:52.663896408Z 2026-03-13T01:12:52.663Z|00011|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: connection attempt failed (No such file or directory) 2026-03-13T01:12:52.663896408Z 2026-03-13T01:12:52.663Z|00012|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: waiting 2 seconds before reconnect 2026-03-13T01:12:54.663962055Z 2026-03-13T01:12:54.663Z|00013|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: connecting... 2026-03-13T01:12:54.664029717Z 2026-03-13T01:12:54.663Z|00014|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: connected 2026-03-13T01:12:54.664453579Z 2026-03-13T01:12:54.664Z|00015|ovn_northd|INFO|ovn-northd lock acquired. This ovn-northd instance is now active. 2026-03-13T01:12:56.229232643Z 2026-03-13T01:12:56.229Z|00016|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: connection closed by peer 2026-03-13T01:12:56.229398198Z 2026-03-13T01:12:56.229Z|00017|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: waiting 4 seconds before reconnect 2026-03-13T01:12:56.229416288Z 2026-03-13T01:12:56.229Z|00018|ovn_northd|INFO|ovn-northd lock lost. This ovn-northd instance is now on standby. 2026-03-13T01:13:00.230330295Z 2026-03-13T01:13:00.230Z|00019|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: connecting... 2026-03-13T01:13:00.230387567Z 2026-03-13T01:13:00.230Z|00020|reconnect|INFO|unix:/var/run/ovn/ovnsb_db.sock: connected 2026-03-13T01:13:00.230862730Z 2026-03-13T01:13:00.230Z|00021|ovn_northd|INFO|ovn-northd lock acquired. This ovn-northd instance is now active. 2026-03-13T01:13:01.876615161Z 2026-03-13T01:13:01.876Z|00022|memory|INFO|13440 kB peak resident set size after 10.2 seconds 2026-03-13T01:13:01.877164356Z 2026-03-13T01:13:01.877Z|00023|memory|INFO|idl-cells-OVN_Northbound:1572 idl-cells-OVN_Southbound:8933 config/pod/openshift-ovn-kubernetes/logs/ovnkube-node-v56ct/kube-rbac-proxy-ovn-metrics_current.log0000640000000000000000000001373315154662741032305 0ustar00000000000000002026-03-13T01:13:31.622298633Z ++ date +%s 2026-03-13T01:13:31.625501392Z + CUR_TS=1773364411 2026-03-13T01:13:31.625501392Z + [[ 1773364411 -gt WARN_TS ]] 2026-03-13T01:13:31.625501392Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:31.625501392Z + sleep 5 2026-03-13T01:13:36.628150266Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:36.630019208Z ++ date +%s 2026-03-13T01:13:36.633845845Z + CUR_TS=1773364416 2026-03-13T01:13:36.633862156Z + [[ 1773364416 -gt WARN_TS ]] 2026-03-13T01:13:36.633892096Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:36.633892096Z + sleep 5 2026-03-13T01:13:41.636844379Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:41.637977721Z ++ date +%s 2026-03-13T01:13:41.642336063Z + CUR_TS=1773364421 2026-03-13T01:13:41.642336063Z + [[ 1773364421 -gt WARN_TS ]] 2026-03-13T01:13:41.642336063Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:41.642336063Z + sleep 5 2026-03-13T01:13:46.644831983Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:46.646043237Z ++ date +%s 2026-03-13T01:13:46.648362292Z + CUR_TS=1773364426 2026-03-13T01:13:46.648362292Z + [[ 1773364426 -gt WARN_TS ]] 2026-03-13T01:13:46.648400313Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:46.648400313Z + sleep 5 2026-03-13T01:13:51.651495830Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:51.653314441Z ++ date +%s 2026-03-13T01:13:51.658443844Z + CUR_TS=1773364431 2026-03-13T01:13:51.658443844Z + [[ 1773364431 -gt WARN_TS ]] 2026-03-13T01:13:51.658443844Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:51.658443844Z + sleep 5 2026-03-13T01:13:56.661255924Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:56.662397386Z ++ date +%s 2026-03-13T01:13:56.667956681Z + CUR_TS=1773364436 2026-03-13T01:13:56.667973132Z + [[ 1773364436 -gt WARN_TS ]] 2026-03-13T01:13:56.667980592Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:56.667989352Z + sleep 5 2026-03-13T01:14:01.671620225Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:01.672444258Z ++ date +%s 2026-03-13T01:14:01.674856835Z + CUR_TS=1773364441 2026-03-13T01:14:01.674876946Z + [[ 1773364441 -gt WARN_TS ]] 2026-03-13T01:14:01.674876946Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:01.674886046Z + sleep 5 2026-03-13T01:14:06.686818889Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:06.688662841Z ++ date +%s 2026-03-13T01:14:06.692664463Z + CUR_TS=1773364446 2026-03-13T01:14:06.692664463Z + [[ 1773364446 -gt WARN_TS ]] 2026-03-13T01:14:06.692664463Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:06.692664463Z + sleep 5 2026-03-13T01:14:11.709722271Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:11.710738529Z ++ date +%s 2026-03-13T01:14:11.719064702Z + CUR_TS=1773364451 2026-03-13T01:14:11.719064702Z + [[ 1773364451 -gt WARN_TS ]] 2026-03-13T01:14:11.719064702Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:11.719064702Z + sleep 5 2026-03-13T01:14:16.725728587Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:16.725728587Z ++ date +%s 2026-03-13T01:14:16.727759544Z + CUR_TS=1773364456 2026-03-13T01:14:16.727759544Z + [[ 1773364456 -gt WARN_TS ]] 2026-03-13T01:14:16.727759544Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:16.727759544Z + sleep 5 2026-03-13T01:14:21.958338088Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:21.958338088Z ++ date +%s 2026-03-13T01:14:21.963347447Z + CUR_TS=1773364461 2026-03-13T01:14:21.963347447Z + [[ 1773364461 -gt WARN_TS ]] 2026-03-13T01:14:21.963347447Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:21.963347447Z + sleep 5 2026-03-13T01:14:26.964668071Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:26.965340329Z ++ date +%s 2026-03-13T01:14:26.968373571Z + CUR_TS=1773364466 2026-03-13T01:14:26.968389971Z + [[ 1773364466 -gt WARN_TS ]] 2026-03-13T01:14:26.968418492Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:26.968418492Z + sleep 5 2026-03-13T01:14:31.971140972Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:31.971627275Z ++ date +%s 2026-03-13T01:14:31.973610978Z + CUR_TS=1773364471 2026-03-13T01:14:31.973610978Z + [[ 1773364471 -gt WARN_TS ]] 2026-03-13T01:14:31.973610978Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:31.973610978Z + sleep 5 2026-03-13T01:14:36.976884093Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:36.977339235Z ++ date +%s 2026-03-13T01:14:36.979872914Z + CUR_TS=1773364476 2026-03-13T01:14:36.979894074Z + [[ 1773364476 -gt WARN_TS ]] 2026-03-13T01:14:36.979903384Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:36.979910665Z + sleep 5 2026-03-13T01:14:41.982820048Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:41.982929451Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.crt ]] 2026-03-13T01:14:41.983538768Z ++ date -Iseconds 2026-03-13T01:14:41.986435575Z + echo '2026-03-13T01:14:41+00:00 INFO: ovn-metrics certs mounted, starting kube-rbac-proxy' 2026-03-13T01:14:41.986451526Z 2026-03-13T01:14:41+00:00 INFO: ovn-metrics certs mounted, starting kube-rbac-proxy 2026-03-13T01:14:41.986486267Z + exec /usr/bin/kube-rbac-proxy --logtostderr --secure-listen-address=:9105 --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 --upstream=http://127.0.0.1:29105/ --tls-private-key-file=/etc/pki/tls/metrics-cert/tls.key --tls-cert-file=/etc/pki/tls/metrics-cert/tls.crt 2026-03-13T01:14:42.020544223Z W0313 01:14:42.020408 5800 deprecated.go:66] 2026-03-13T01:14:42.020544223Z ==== Removed Flag Warning ====================== 2026-03-13T01:14:42.020544223Z 2026-03-13T01:14:42.020544223Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T01:14:42.020544223Z 2026-03-13T01:14:42.020544223Z =============================================== 2026-03-13T01:14:42.020544223Z 2026-03-13T01:14:42.020916203Z I0313 01:14:42.020890 5800 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T01:14:42.022063713Z I0313 01:14:42.022044 5800 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T01:14:42.022591828Z I0313 01:14:42.022571 5800 kube-rbac-proxy.go:395] Starting TCP socket on :9105 2026-03-13T01:14:42.022943437Z I0313 01:14:42.022915 5800 kube-rbac-proxy.go:402] Listening securely on :9105 config/pod/openshift-ovn-kubernetes/logs/ovnkube-node-v56ct/kube-rbac-proxy-node_current.log0000640000000000000000000001374515154662741030767 0ustar00000000000000002026-03-13T01:13:31.517014786Z ++ date +%s 2026-03-13T01:13:31.521234264Z + CUR_TS=1773364411 2026-03-13T01:13:31.521234264Z + [[ 1773364411 -gt WARN_TS ]] 2026-03-13T01:13:31.521271675Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:31.521271675Z + sleep 5 2026-03-13T01:13:36.525067131Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:36.525949965Z ++ date +%s 2026-03-13T01:13:36.528283291Z + CUR_TS=1773364416 2026-03-13T01:13:36.528298811Z + [[ 1773364416 -gt WARN_TS ]] 2026-03-13T01:13:36.528318642Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:36.528318642Z + sleep 5 2026-03-13T01:13:41.533280700Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:41.534293359Z ++ date +%s 2026-03-13T01:13:41.537076587Z + CUR_TS=1773364421 2026-03-13T01:13:41.537100307Z + [[ 1773364421 -gt WARN_TS ]] 2026-03-13T01:13:41.537100307Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:41.537112078Z + sleep 5 2026-03-13T01:13:46.541244934Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:46.542927271Z ++ date +%s 2026-03-13T01:13:46.545905255Z + CUR_TS=1773364426 2026-03-13T01:13:46.545905255Z + [[ 1773364426 -gt WARN_TS ]] 2026-03-13T01:13:46.545938975Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:46.545938975Z + sleep 5 2026-03-13T01:13:51.550936065Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:51.552033296Z ++ date +%s 2026-03-13T01:13:51.554756462Z + CUR_TS=1773364431 2026-03-13T01:13:51.554835995Z + [[ 1773364431 -gt WARN_TS ]] 2026-03-13T01:13:51.554878996Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:51.554915037Z + sleep 5 2026-03-13T01:13:56.558607701Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:13:56.559124155Z ++ date +%s 2026-03-13T01:13:56.563476657Z + CUR_TS=1773364436 2026-03-13T01:13:56.563579240Z + [[ 1773364436 -gt WARN_TS ]] 2026-03-13T01:13:56.563701683Z + [[ 1 -eq 0 ]] 2026-03-13T01:13:56.563770155Z + sleep 5 2026-03-13T01:14:01.568220171Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:01.568496258Z ++ date +%s 2026-03-13T01:14:01.570946067Z + CUR_TS=1773364441 2026-03-13T01:14:01.571024959Z + [[ 1773364441 -gt WARN_TS ]] 2026-03-13T01:14:01.571063290Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:01.571140832Z + sleep 5 2026-03-13T01:14:06.574163256Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:06.575461852Z ++ date +%s 2026-03-13T01:14:06.579583918Z + CUR_TS=1773364446 2026-03-13T01:14:06.579698871Z + [[ 1773364446 -gt WARN_TS ]] 2026-03-13T01:14:06.579765423Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:06.579817354Z + sleep 5 2026-03-13T01:14:11.584133516Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:11.584595598Z ++ date +%s 2026-03-13T01:14:11.587878390Z + CUR_TS=1773364451 2026-03-13T01:14:11.587928332Z + [[ 1773364451 -gt WARN_TS ]] 2026-03-13T01:14:11.587958973Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:11.587983233Z + sleep 5 2026-03-13T01:14:16.591366133Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:16.591724023Z ++ date +%s 2026-03-13T01:14:16.594883181Z + CUR_TS=1773364456 2026-03-13T01:14:16.594883181Z + [[ 1773364456 -gt WARN_TS ]] 2026-03-13T01:14:16.594883181Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:16.594883181Z + sleep 5 2026-03-13T01:14:21.954926043Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:21.955284553Z ++ date +%s 2026-03-13T01:14:21.959219583Z + CUR_TS=1773364461 2026-03-13T01:14:21.959310395Z + [[ 1773364461 -gt WARN_TS ]] 2026-03-13T01:14:21.959342676Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:21.959475150Z + sleep 5 2026-03-13T01:14:26.962366619Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:26.964012024Z ++ date +%s 2026-03-13T01:14:26.966378287Z + CUR_TS=1773364466 2026-03-13T01:14:26.966449339Z + [[ 1773364466 -gt WARN_TS ]] 2026-03-13T01:14:26.966488390Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:26.966519551Z + sleep 5 2026-03-13T01:14:31.969148648Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:31.969415965Z ++ date +%s 2026-03-13T01:14:31.974037549Z + CUR_TS=1773364471 2026-03-13T01:14:31.974107671Z + [[ 1773364471 -gt WARN_TS ]] 2026-03-13T01:14:31.974147472Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:31.974177083Z + sleep 5 2026-03-13T01:14:36.977329795Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:36.978074305Z ++ date +%s 2026-03-13T01:14:36.980585283Z + CUR_TS=1773364476 2026-03-13T01:14:36.980646054Z + [[ 1773364476 -gt WARN_TS ]] 2026-03-13T01:14:36.980680615Z + [[ 1 -eq 0 ]] 2026-03-13T01:14:36.980704876Z + sleep 5 2026-03-13T01:14:41.983244200Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.key ]] 2026-03-13T01:14:41.983244200Z + [[ ! -f /etc/pki/tls/metrics-cert/tls.crt ]] 2026-03-13T01:14:41.984019050Z ++ date -Iseconds 2026-03-13T01:14:41.985888661Z + echo '2026-03-13T01:14:41+00:00 INFO: ovn-node-metrics certs mounted, starting kube-rbac-proxy' 2026-03-13T01:14:41.985937822Z 2026-03-13T01:14:41+00:00 INFO: ovn-node-metrics certs mounted, starting kube-rbac-proxy 2026-03-13T01:14:41.986003374Z + exec /usr/bin/kube-rbac-proxy --logtostderr --secure-listen-address=:9103 --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 --upstream=http://127.0.0.1:29103/ --tls-private-key-file=/etc/pki/tls/metrics-cert/tls.key --tls-cert-file=/etc/pki/tls/metrics-cert/tls.crt 2026-03-13T01:14:42.020933223Z W0313 01:14:42.020820 5788 deprecated.go:66] 2026-03-13T01:14:42.020933223Z ==== Removed Flag Warning ====================== 2026-03-13T01:14:42.020933223Z 2026-03-13T01:14:42.020933223Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T01:14:42.020933223Z 2026-03-13T01:14:42.020933223Z =============================================== 2026-03-13T01:14:42.020933223Z 2026-03-13T01:14:42.021307083Z I0313 01:14:42.021276 5788 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T01:14:42.022431703Z I0313 01:14:42.022411 5788 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T01:14:42.023030929Z I0313 01:14:42.022661 5788 kube-rbac-proxy.go:395] Starting TCP socket on :9103 2026-03-13T01:14:42.023030929Z I0313 01:14:42.022996 5788 kube-rbac-proxy.go:402] Listening securely on :9103 config/pod/openshift-ovn-kubernetes/logs/ovnkube-node-v56ct/ovn-acl-logging_current.log0000640000000000000000000001213015154662741030000 0ustar00000000000000002026-03-13T01:13:51.407022187Z ++ wc -l 2026-03-13T01:13:51.410547016Z + num_files=1 2026-03-13T01:13:51.410547016Z + '[' 1 -gt 5 ']' 2026-03-13T01:13:51.410588777Z + sleep 30 2026-03-13T01:14:21.974973689Z + true 2026-03-13T01:14:21.974973689Z + '[' -f /var/log/ovn/acl-audit-log.log ']' 2026-03-13T01:14:21.974973689Z ++ du -b /var/log/ovn/acl-audit-log.log 2026-03-13T01:14:21.974973689Z ++ tr -s '\t' ' ' 2026-03-13T01:14:21.974973689Z ++ cut '-d ' -f1 2026-03-13T01:14:21.976572242Z + file_size=0 2026-03-13T01:14:21.976572242Z + '[' 0 -gt 50000000 ']' 2026-03-13T01:14:21.976572242Z ++ ls -1 /var/log/ovn/acl-audit-log.log 2026-03-13T01:14:21.981783671Z ++ wc -l 2026-03-13T01:14:21.984741301Z + num_files=1 2026-03-13T01:14:21.984741301Z + '[' 1 -gt 5 ']' 2026-03-13T01:14:21.984741301Z + sleep 30 2026-03-13T01:14:51.984940300Z + true 2026-03-13T01:14:51.984940300Z + '[' -f /var/log/ovn/acl-audit-log.log ']' 2026-03-13T01:14:51.986267925Z ++ du -b /var/log/ovn/acl-audit-log.log 2026-03-13T01:14:51.986494522Z ++ tr -s '\t' ' ' 2026-03-13T01:14:51.986676686Z ++ cut '-d ' -f1 2026-03-13T01:14:51.991022933Z + file_size=0 2026-03-13T01:14:51.991045974Z + '[' 0 -gt 50000000 ']' 2026-03-13T01:14:51.992268167Z ++ ls -1 /var/log/ovn/acl-audit-log.log 2026-03-13T01:14:51.992385150Z ++ wc -l 2026-03-13T01:14:51.997059706Z + num_files=1 2026-03-13T01:14:51.997059706Z + '[' 1 -gt 5 ']' 2026-03-13T01:14:51.997059706Z + sleep 30 2026-03-13T01:15:22.000409116Z + true 2026-03-13T01:15:22.000442127Z + '[' -f /var/log/ovn/acl-audit-log.log ']' 2026-03-13T01:15:22.002109982Z ++ du -b /var/log/ovn/acl-audit-log.log 2026-03-13T01:15:22.002212125Z ++ tr -s '\t' ' ' 2026-03-13T01:15:22.002573835Z ++ cut '-d ' -f1 2026-03-13T01:15:22.007072136Z + file_size=0 2026-03-13T01:15:22.007108226Z + '[' 0 -gt 50000000 ']' 2026-03-13T01:15:22.008541865Z ++ ls -1 /var/log/ovn/acl-audit-log.log 2026-03-13T01:15:22.008711000Z ++ wc -l 2026-03-13T01:15:22.012177633Z + num_files=1 2026-03-13T01:15:22.012198763Z + '[' 1 -gt 5 ']' 2026-03-13T01:15:22.012233504Z + sleep 30 2026-03-13T01:15:52.016609420Z + true 2026-03-13T01:15:52.016609420Z + '[' -f /var/log/ovn/acl-audit-log.log ']' 2026-03-13T01:15:52.018300016Z ++ du -b /var/log/ovn/acl-audit-log.log 2026-03-13T01:15:52.018715957Z ++ tr -s '\t' ' ' 2026-03-13T01:15:52.019083477Z ++ cut '-d ' -f1 2026-03-13T01:15:52.023191648Z + file_size=0 2026-03-13T01:15:52.023191648Z + '[' 0 -gt 50000000 ']' 2026-03-13T01:15:52.024875024Z ++ ls -1 /var/log/ovn/acl-audit-log.log 2026-03-13T01:15:52.025027408Z ++ wc -l 2026-03-13T01:15:52.029442387Z + num_files=1 2026-03-13T01:15:52.029482218Z + '[' 1 -gt 5 ']' 2026-03-13T01:15:52.029482218Z + sleep 30 2026-03-13T01:16:22.033510146Z + true 2026-03-13T01:16:22.033510146Z + '[' -f /var/log/ovn/acl-audit-log.log ']' 2026-03-13T01:16:22.035242073Z ++ du -b /var/log/ovn/acl-audit-log.log 2026-03-13T01:16:22.035546161Z ++ tr -s '\t' ' ' 2026-03-13T01:16:22.035907841Z ++ cut '-d ' -f1 2026-03-13T01:16:22.040348381Z + file_size=0 2026-03-13T01:16:22.040348381Z + '[' 0 -gt 50000000 ']' 2026-03-13T01:16:22.041936754Z ++ ls -1 /var/log/ovn/acl-audit-log.log 2026-03-13T01:16:22.042088988Z ++ wc -l 2026-03-13T01:16:22.046404445Z + num_files=1 2026-03-13T01:16:22.046404445Z + '[' 1 -gt 5 ']' 2026-03-13T01:16:22.046404445Z + sleep 30 2026-03-13T01:16:52.050417414Z + true 2026-03-13T01:16:52.050417414Z + '[' -f /var/log/ovn/acl-audit-log.log ']' 2026-03-13T01:16:52.052052859Z ++ du -b /var/log/ovn/acl-audit-log.log 2026-03-13T01:16:52.052436329Z ++ tr -s '\t' ' ' 2026-03-13T01:16:52.052776858Z ++ cut '-d ' -f1 2026-03-13T01:16:52.056953551Z + file_size=0 2026-03-13T01:16:52.056953551Z + '[' 0 -gt 50000000 ']' 2026-03-13T01:16:52.058592525Z ++ wc -l 2026-03-13T01:16:52.058592525Z ++ ls -1 /var/log/ovn/acl-audit-log.log 2026-03-13T01:16:52.062678706Z + num_files=1 2026-03-13T01:16:52.062714927Z + '[' 1 -gt 5 ']' 2026-03-13T01:16:52.062730767Z + sleep 30 2026-03-13T01:17:22.066688734Z + true 2026-03-13T01:17:22.066688734Z + '[' -f /var/log/ovn/acl-audit-log.log ']' 2026-03-13T01:17:22.068256097Z ++ du -b /var/log/ovn/acl-audit-log.log 2026-03-13T01:17:22.068726250Z ++ tr -s '\t' ' ' 2026-03-13T01:17:22.068894634Z ++ cut '-d ' -f1 2026-03-13T01:17:22.073051607Z + file_size=0 2026-03-13T01:17:22.073051607Z + '[' 0 -gt 50000000 ']' 2026-03-13T01:17:22.074426264Z ++ ls -1 /var/log/ovn/acl-audit-log.log 2026-03-13T01:17:22.074593588Z ++ wc -l 2026-03-13T01:17:22.079012068Z + num_files=1 2026-03-13T01:17:22.079012068Z + '[' 1 -gt 5 ']' 2026-03-13T01:17:22.079056279Z + sleep 30 2026-03-13T01:17:52.084811746Z + true 2026-03-13T01:17:52.084811746Z + '[' -f /var/log/ovn/acl-audit-log.log ']' 2026-03-13T01:17:52.085243978Z ++ du -b /var/log/ovn/acl-audit-log.log 2026-03-13T01:17:52.085456003Z ++ tr -s '\t' ' ' 2026-03-13T01:17:52.085773102Z ++ cut '-d ' -f1 2026-03-13T01:17:52.091088661Z + file_size=0 2026-03-13T01:17:52.091114261Z + '[' 0 -gt 50000000 ']' 2026-03-13T01:17:52.092661782Z ++ ls -1 /var/log/ovn/acl-audit-log.log 2026-03-13T01:17:52.092806996Z ++ wc -l 2026-03-13T01:17:52.096781189Z + num_files=1 2026-03-13T01:17:52.096812360Z + '[' 1 -gt 5 ']' 2026-03-13T01:17:52.096812360Z + sleep 30 config/pod/openshift-ovn-kubernetes/logs/ovnkube-node-v56ct/ovn-controller_current.log0000640000000000000000000004063215154662741030010 0ustar00000000000000002026-03-13T01:15:40.908650402Z 2026-03-13T01:15:40.908Z|00358|binding|INFO|Setting lport openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g ovn-installed in OVS 2026-03-13T01:15:40.908650402Z 2026-03-13T01:15:40.908Z|00359|binding|INFO|Setting lport openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g up in Southbound 2026-03-13T01:15:41.940552435Z 2026-03-13T01:15:41.940Z|00360|binding|INFO|Claiming lport openshift-insights_insights-operator-8f89dfddd-6k2t7 for this chassis. 2026-03-13T01:15:41.940552435Z 2026-03-13T01:15:41.940Z|00361|binding|INFO|openshift-insights_insights-operator-8f89dfddd-6k2t7: Claiming 0a:58:0a:80:00:43 10.128.0.67 2026-03-13T01:15:42.003540720Z 2026-03-13T01:15:42.003Z|00362|binding|INFO|Setting lport openshift-insights_insights-operator-8f89dfddd-6k2t7 ovn-installed in OVS 2026-03-13T01:15:42.003540720Z 2026-03-13T01:15:42.003Z|00363|binding|INFO|Setting lport openshift-insights_insights-operator-8f89dfddd-6k2t7 up in Southbound 2026-03-13T01:15:42.006422208Z 2026-03-13T01:15:42.006Z|00364|binding|INFO|Claiming lport openshift-marketplace_certified-operators-9zvz2 for this chassis. 2026-03-13T01:15:42.006422208Z 2026-03-13T01:15:42.006Z|00365|binding|INFO|openshift-marketplace_certified-operators-9zvz2: Claiming 0a:58:0a:80:00:44 10.128.0.68 2026-03-13T01:15:42.006422208Z 2026-03-13T01:15:42.006Z|00366|binding|INFO|Claiming lport openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb for this chassis. 2026-03-13T01:15:42.006422208Z 2026-03-13T01:15:42.006Z|00367|binding|INFO|openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb: Claiming 0a:58:0a:80:00:45 10.128.0.69 2026-03-13T01:15:42.094935783Z 2026-03-13T01:15:42.094Z|00368|binding|INFO|Setting lport openshift-marketplace_certified-operators-9zvz2 ovn-installed in OVS 2026-03-13T01:15:42.094935783Z 2026-03-13T01:15:42.094Z|00369|binding|INFO|Setting lport openshift-marketplace_certified-operators-9zvz2 up in Southbound 2026-03-13T01:15:42.094935783Z 2026-03-13T01:15:42.094Z|00370|binding|INFO|Setting lport openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb ovn-installed in OVS 2026-03-13T01:15:42.094935783Z 2026-03-13T01:15:42.094Z|00371|binding|INFO|Setting lport openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb up in Southbound 2026-03-13T01:15:42.096891596Z 2026-03-13T01:15:42.096Z|00372|binding|INFO|Claiming lport openshift-marketplace_community-operators-cpp59 for this chassis. 2026-03-13T01:15:42.096891596Z 2026-03-13T01:15:42.096Z|00373|binding|INFO|openshift-marketplace_community-operators-cpp59: Claiming 0a:58:0a:80:00:46 10.128.0.70 2026-03-13T01:15:42.144879305Z 2026-03-13T01:15:42.144Z|00374|binding|INFO|Setting lport openshift-marketplace_community-operators-cpp59 ovn-installed in OVS 2026-03-13T01:15:42.144879305Z 2026-03-13T01:15:42.144Z|00375|binding|INFO|Setting lport openshift-marketplace_community-operators-cpp59 up in Southbound 2026-03-13T01:16:19.069219734Z 2026-03-13T01:16:19.069Z|00376|binding|INFO|Releasing lport openshift-kube-controller-manager_installer-3-master-0 from this chassis (sb_readonly=0) 2026-03-13T01:16:19.069219734Z 2026-03-13T01:16:19.069Z|00377|binding|INFO|Setting lport openshift-kube-controller-manager_installer-3-master-0 down in Southbound 2026-03-13T01:16:19.089199694Z 2026-03-13T01:16:19.089Z|00378|binding|INFO|Releasing lport openshift-kube-apiserver_installer-1-master-0 from this chassis (sb_readonly=0) 2026-03-13T01:16:19.089199694Z 2026-03-13T01:16:19.089Z|00379|binding|INFO|Setting lport openshift-kube-apiserver_installer-1-master-0 down in Southbound 2026-03-13T01:16:41.242962678Z 2026-03-13T01:16:41.242Z|00380|binding|INFO|Releasing lport openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g from this chassis (sb_readonly=0) 2026-03-13T01:16:41.242962678Z 2026-03-13T01:16:41.242Z|00381|binding|INFO|Setting lport openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g down in Southbound 2026-03-13T01:16:42.296836756Z 2026-03-13T01:16:42.296Z|00382|binding|INFO|Claiming lport openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g for this chassis. 2026-03-13T01:16:42.296836756Z 2026-03-13T01:16:42.296Z|00383|binding|INFO|openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g: Claiming 0a:58:0a:80:00:42 10.128.0.66 2026-03-13T01:16:42.301231485Z 2026-03-13T01:16:42.301Z|00384|binding|INFO|Releasing lport openshift-insights_insights-operator-8f89dfddd-6k2t7 from this chassis (sb_readonly=0) 2026-03-13T01:16:42.301231485Z 2026-03-13T01:16:42.301Z|00385|binding|INFO|Setting lport openshift-insights_insights-operator-8f89dfddd-6k2t7 down in Southbound 2026-03-13T01:16:42.354157887Z 2026-03-13T01:16:42.354Z|00386|binding|INFO|Releasing lport openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb from this chassis (sb_readonly=0) 2026-03-13T01:16:42.354157887Z 2026-03-13T01:16:42.354Z|00387|binding|INFO|Setting lport openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb down in Southbound 2026-03-13T01:16:42.378479125Z 2026-03-13T01:16:42.378Z|00388|binding|INFO|Releasing lport openshift-marketplace_certified-operators-9zvz2 from this chassis (sb_readonly=0) 2026-03-13T01:16:42.378479125Z 2026-03-13T01:16:42.378Z|00389|binding|INFO|Setting lport openshift-marketplace_certified-operators-9zvz2 down in Southbound 2026-03-13T01:16:42.444248715Z 2026-03-13T01:16:42.444Z|00390|binding|INFO|Releasing lport openshift-marketplace_community-operators-cpp59 from this chassis (sb_readonly=0) 2026-03-13T01:16:42.444248715Z 2026-03-13T01:16:42.444Z|00391|binding|INFO|Setting lport openshift-marketplace_community-operators-cpp59 down in Southbound 2026-03-13T01:16:42.546214514Z 2026-03-13T01:16:42.546Z|00392|binding|INFO|Setting lport openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g ovn-installed in OVS 2026-03-13T01:16:42.546214514Z 2026-03-13T01:16:42.546Z|00393|binding|INFO|Setting lport openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g up in Southbound 2026-03-13T01:16:43.360011774Z 2026-03-13T01:16:43.359Z|00394|binding|INFO|Claiming lport openshift-insights_insights-operator-8f89dfddd-6k2t7 for this chassis. 2026-03-13T01:16:43.360011774Z 2026-03-13T01:16:43.359Z|00395|binding|INFO|openshift-insights_insights-operator-8f89dfddd-6k2t7: Claiming 0a:58:0a:80:00:43 10.128.0.67 2026-03-13T01:16:43.413248035Z 2026-03-13T01:16:43.413Z|00396|binding|INFO|Setting lport openshift-insights_insights-operator-8f89dfddd-6k2t7 ovn-installed in OVS 2026-03-13T01:16:43.413248035Z 2026-03-13T01:16:43.413Z|00397|binding|INFO|Setting lport openshift-insights_insights-operator-8f89dfddd-6k2t7 up in Southbound 2026-03-13T01:16:43.423163823Z 2026-03-13T01:16:43.423Z|00398|binding|INFO|Claiming lport openshift-marketplace_certified-operators-9zvz2 for this chassis. 2026-03-13T01:16:43.423163823Z 2026-03-13T01:16:43.423Z|00399|binding|INFO|openshift-marketplace_certified-operators-9zvz2: Claiming 0a:58:0a:80:00:44 10.128.0.68 2026-03-13T01:16:43.423208314Z 2026-03-13T01:16:43.423Z|00400|binding|INFO|Claiming lport openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb for this chassis. 2026-03-13T01:16:43.423208314Z 2026-03-13T01:16:43.423Z|00401|binding|INFO|openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb: Claiming 0a:58:0a:80:00:45 10.128.0.69 2026-03-13T01:16:43.423240305Z 2026-03-13T01:16:43.423Z|00402|binding|INFO|Claiming lport openshift-marketplace_community-operators-cpp59 for this chassis. 2026-03-13T01:16:43.423240305Z 2026-03-13T01:16:43.423Z|00403|binding|INFO|openshift-marketplace_community-operators-cpp59: Claiming 0a:58:0a:80:00:46 10.128.0.70 2026-03-13T01:16:43.544571378Z 2026-03-13T01:16:43.544Z|00404|binding|INFO|Setting lport openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb ovn-installed in OVS 2026-03-13T01:16:43.544571378Z 2026-03-13T01:16:43.544Z|00405|binding|INFO|Setting lport openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb up in Southbound 2026-03-13T01:16:43.544616480Z 2026-03-13T01:16:43.544Z|00406|binding|INFO|Setting lport openshift-marketplace_community-operators-cpp59 ovn-installed in OVS 2026-03-13T01:16:43.544616480Z 2026-03-13T01:16:43.544Z|00407|binding|INFO|Setting lport openshift-marketplace_community-operators-cpp59 up in Southbound 2026-03-13T01:16:43.544616480Z 2026-03-13T01:16:43.544Z|00408|binding|INFO|Setting lport openshift-marketplace_certified-operators-9zvz2 ovn-installed in OVS 2026-03-13T01:16:43.544656551Z 2026-03-13T01:16:43.544Z|00409|binding|INFO|Setting lport openshift-marketplace_certified-operators-9zvz2 up in Southbound 2026-03-13T01:17:38.703545512Z 2026-03-13T01:17:38.703Z|00410|binding|INFO|Releasing lport openshift-kube-scheduler_installer-6-master-0 from this chassis (sb_readonly=0) 2026-03-13T01:17:38.703545512Z 2026-03-13T01:17:38.703Z|00411|binding|INFO|Setting lport openshift-kube-scheduler_installer-6-master-0 down in Southbound 2026-03-13T01:17:45.988591337Z 2026-03-13T01:17:45.988Z|00412|binding|INFO|Releasing lport openshift-marketplace_redhat-marketplace-29mns from this chassis (sb_readonly=0) 2026-03-13T01:17:45.988591337Z 2026-03-13T01:17:45.988Z|00413|binding|INFO|Setting lport openshift-marketplace_redhat-marketplace-29mns down in Southbound 2026-03-13T01:17:47.954561898Z 2026-03-13T01:17:47.952Z|00414|binding|INFO|Releasing lport openshift-marketplace_community-operators-cpp59 from this chassis (sb_readonly=0) 2026-03-13T01:17:47.954561898Z 2026-03-13T01:17:47.952Z|00415|binding|INFO|Setting lport openshift-marketplace_community-operators-cpp59 down in Southbound 2026-03-13T01:17:48.362125658Z 2026-03-13T01:17:48.360Z|00416|binding|INFO|Releasing lport openshift-marketplace_redhat-operators-lb5rz from this chassis (sb_readonly=0) 2026-03-13T01:17:48.362125658Z 2026-03-13T01:17:48.360Z|00417|binding|INFO|Setting lport openshift-marketplace_redhat-operators-lb5rz down in Southbound 2026-03-13T01:17:55.915114670Z 2026-03-13T01:17:55.915Z|00418|binding|INFO|Claiming lport openshift-kube-controller-manager_installer-3-retry-1-master-0 for this chassis. 2026-03-13T01:17:55.915114670Z 2026-03-13T01:17:55.915Z|00419|binding|INFO|openshift-kube-controller-manager_installer-3-retry-1-master-0: Claiming 0a:58:0a:80:00:47 10.128.0.71 2026-03-13T01:17:55.982599205Z 2026-03-13T01:17:55.982Z|00420|binding|INFO|Setting lport openshift-kube-controller-manager_installer-3-retry-1-master-0 ovn-installed in OVS 2026-03-13T01:17:55.982599205Z 2026-03-13T01:17:55.982Z|00421|binding|INFO|Setting lport openshift-kube-controller-manager_installer-3-retry-1-master-0 up in Southbound 2026-03-13T01:18:00.121211773Z 2026-03-13T01:18:00.121Z|00422|binding|INFO|Claiming lport openshift-marketplace_redhat-operators-k52lh for this chassis. 2026-03-13T01:18:00.121211773Z 2026-03-13T01:18:00.121Z|00423|binding|INFO|openshift-marketplace_redhat-operators-k52lh: Claiming 0a:58:0a:80:00:48 10.128.0.72 2026-03-13T01:18:00.188664947Z 2026-03-13T01:18:00.188Z|00424|binding|INFO|Setting lport openshift-marketplace_redhat-operators-k52lh ovn-installed in OVS 2026-03-13T01:18:00.188664947Z 2026-03-13T01:18:00.188Z|00425|binding|INFO|Setting lport openshift-marketplace_redhat-operators-k52lh up in Southbound 2026-03-13T01:18:00.201751019Z 2026-03-13T01:18:00.201Z|00426|binding|INFO|Claiming lport openshift-marketplace_community-operators-bbptx for this chassis. 2026-03-13T01:18:00.201751019Z 2026-03-13T01:18:00.201Z|00427|binding|INFO|openshift-marketplace_community-operators-bbptx: Claiming 0a:58:0a:80:00:4a 10.128.0.74 2026-03-13T01:18:00.201751019Z 2026-03-13T01:18:00.201Z|00428|binding|INFO|Claiming lport openshift-marketplace_redhat-marketplace-z254g for this chassis. 2026-03-13T01:18:00.201751019Z 2026-03-13T01:18:00.201Z|00429|binding|INFO|openshift-marketplace_redhat-marketplace-z254g: Claiming 0a:58:0a:80:00:49 10.128.0.73 2026-03-13T01:18:00.304397824Z 2026-03-13T01:18:00.304Z|00430|binding|INFO|Setting lport openshift-marketplace_redhat-marketplace-z254g ovn-installed in OVS 2026-03-13T01:18:00.304397824Z 2026-03-13T01:18:00.304Z|00431|binding|INFO|Setting lport openshift-marketplace_redhat-marketplace-z254g up in Southbound 2026-03-13T01:18:00.304397824Z 2026-03-13T01:18:00.304Z|00432|binding|INFO|Setting lport openshift-marketplace_community-operators-bbptx ovn-installed in OVS 2026-03-13T01:18:00.304397824Z 2026-03-13T01:18:00.304Z|00433|binding|INFO|Setting lport openshift-marketplace_community-operators-bbptx up in Southbound 2026-03-13T01:18:07.906702236Z 2026-03-13T01:18:07.906Z|00434|binding|INFO|Claiming lport openshift-multus_multus-admission-controller-7769569c45-zm2jl for this chassis. 2026-03-13T01:18:07.906702236Z 2026-03-13T01:18:07.906Z|00435|binding|INFO|openshift-multus_multus-admission-controller-7769569c45-zm2jl: Claiming 0a:58:0a:80:00:4b 10.128.0.75 2026-03-13T01:18:07.959117337Z 2026-03-13T01:18:07.958Z|00436|binding|INFO|Setting lport openshift-multus_multus-admission-controller-7769569c45-zm2jl ovn-installed in OVS 2026-03-13T01:18:07.959117337Z 2026-03-13T01:18:07.959Z|00437|binding|INFO|Setting lport openshift-multus_multus-admission-controller-7769569c45-zm2jl up in Southbound 2026-03-13T01:18:08.281722665Z 2026-03-13T01:18:08.275Z|00438|binding|INFO|Claiming lport openshift-machine-api_machine-api-operator-84bf6db4f9-zt229 for this chassis. 2026-03-13T01:18:08.281722665Z 2026-03-13T01:18:08.275Z|00439|binding|INFO|openshift-machine-api_machine-api-operator-84bf6db4f9-zt229: Claiming 0a:58:0a:80:00:4c 10.128.0.76 2026-03-13T01:18:08.326555278Z 2026-03-13T01:18:08.326Z|00440|binding|INFO|Setting lport openshift-machine-api_machine-api-operator-84bf6db4f9-zt229 ovn-installed in OVS 2026-03-13T01:18:08.326555278Z 2026-03-13T01:18:08.326Z|00441|binding|INFO|Setting lport openshift-machine-api_machine-api-operator-84bf6db4f9-zt229 up in Southbound 2026-03-13T01:18:11.675566063Z 2026-03-13T01:18:11.675Z|00442|binding|INFO|Claiming lport openshift-kube-apiserver_installer-1-retry-1-master-0 for this chassis. 2026-03-13T01:18:11.675566063Z 2026-03-13T01:18:11.675Z|00443|binding|INFO|openshift-kube-apiserver_installer-1-retry-1-master-0: Claiming 0a:58:0a:80:00:4d 10.128.0.77 2026-03-13T01:18:11.735771218Z 2026-03-13T01:18:11.735Z|00444|binding|INFO|Setting lport openshift-kube-apiserver_installer-1-retry-1-master-0 ovn-installed in OVS 2026-03-13T01:18:11.735771218Z 2026-03-13T01:18:11.735Z|00445|binding|INFO|Setting lport openshift-kube-apiserver_installer-1-retry-1-master-0 up in Southbound 2026-03-13T01:18:11.747522496Z 2026-03-13T01:18:11.747Z|00446|binding|INFO|Claiming lport openshift-machine-config-operator_machine-config-controller-ff46b7bdf-g7wfh for this chassis. 2026-03-13T01:18:11.747522496Z 2026-03-13T01:18:11.747Z|00447|binding|INFO|openshift-machine-config-operator_machine-config-controller-ff46b7bdf-g7wfh: Claiming 0a:58:0a:80:00:4e 10.128.0.78 2026-03-13T01:18:11.818741788Z 2026-03-13T01:18:11.818Z|00448|binding|INFO|Setting lport openshift-machine-config-operator_machine-config-controller-ff46b7bdf-g7wfh ovn-installed in OVS 2026-03-13T01:18:11.818741788Z 2026-03-13T01:18:11.818Z|00449|binding|INFO|Setting lport openshift-machine-config-operator_machine-config-controller-ff46b7bdf-g7wfh up in Southbound 2026-03-13T01:18:12.805363824Z 2026-03-13T01:18:12.805Z|00450|binding|INFO|Claiming lport openshift-monitoring_prometheus-operator-admission-webhook-8464df8497-kjwgg for this chassis. 2026-03-13T01:18:12.805363824Z 2026-03-13T01:18:12.805Z|00451|binding|INFO|openshift-monitoring_prometheus-operator-admission-webhook-8464df8497-kjwgg: Claiming 0a:58:0a:80:00:4f 10.128.0.79 2026-03-13T01:18:12.859344886Z 2026-03-13T01:18:12.859Z|00452|binding|INFO|Setting lport openshift-monitoring_prometheus-operator-admission-webhook-8464df8497-kjwgg ovn-installed in OVS 2026-03-13T01:18:12.859344886Z 2026-03-13T01:18:12.859Z|00453|binding|INFO|Setting lport openshift-monitoring_prometheus-operator-admission-webhook-8464df8497-kjwgg up in Southbound 2026-03-13T01:18:13.148327714Z 2026-03-13T01:18:13.148Z|00454|binding|INFO|Claiming lport openshift-network-diagnostics_network-check-source-7c67b67d47-5fv6h for this chassis. 2026-03-13T01:18:13.148327714Z 2026-03-13T01:18:13.148Z|00455|binding|INFO|openshift-network-diagnostics_network-check-source-7c67b67d47-5fv6h: Claiming 0a:58:0a:80:00:50 10.128.0.80 2026-03-13T01:18:13.214349341Z 2026-03-13T01:18:13.214Z|00456|binding|INFO|Setting lport openshift-network-diagnostics_network-check-source-7c67b67d47-5fv6h ovn-installed in OVS 2026-03-13T01:18:13.214349341Z 2026-03-13T01:18:13.214Z|00457|binding|INFO|Setting lport openshift-network-diagnostics_network-check-source-7c67b67d47-5fv6h up in Southbound ovnkube-cluster-manager_current.log0000640000000000000000000003776615154662741034741 0ustar0000000000000000config/pod/openshift-ovn-kubernetes/logs/ovnkube-control-plane-66b55d57d-cjmvd2026-03-13T01:17:40.260416340Z I0313 01:17:40.260401 1 reflector.go:403] "Listing and watching" type="*v1alpha1.IPAMClaim" reflector="github.com/k8snetworkplumbingwg/ipamclaims/pkg/crd/ipamclaims/v1alpha1/apis/informers/externalversions/factory.go:141" 2026-03-13T01:17:40.261771290Z I0313 01:17:40.261747 1 reflector.go:430] "Caches populated" type="*v1alpha1.IPAMClaim" reflector="github.com/k8snetworkplumbingwg/ipamclaims/pkg/crd/ipamclaims/v1alpha1/apis/informers/externalversions/factory.go:141" 2026-03-13T01:17:40.266177386Z I0313 01:17:40.266141 1 factory.go:1890] *v1alpha1.IPAMClaim informer cache synced successfully 2026-03-13T01:17:40.266321565Z I0313 01:17:40.266304 1 reflector.go:357] "Starting reflector" type="*v1.NetworkAttachmentDefinition" resyncPeriod="0s" reflector="github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/client/informers/externalversions/factory.go:117" 2026-03-13T01:17:40.266330324Z I0313 01:17:40.266318 1 reflector.go:403] "Listing and watching" type="*v1.NetworkAttachmentDefinition" reflector="github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/client/informers/externalversions/factory.go:117" 2026-03-13T01:17:40.267927367Z I0313 01:17:40.267893 1 reflector.go:430] "Caches populated" type="*v1.NetworkAttachmentDefinition" reflector="github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/client/informers/externalversions/factory.go:117" 2026-03-13T01:17:40.271379483Z I0313 01:17:40.271345 1 factory.go:1890] *v1.NetworkAttachmentDefinition informer cache synced successfully 2026-03-13T01:17:40.271448158Z I0313 01:17:40.271432 1 reflector.go:357] "Starting reflector" type="*v1.ClusterUserDefinedNetwork" resyncPeriod="0s" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/userdefinednetwork/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:40.271448158Z I0313 01:17:40.271444 1 reflector.go:403] "Listing and watching" type="*v1.ClusterUserDefinedNetwork" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/userdefinednetwork/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:40.271622805Z I0313 01:17:40.271604 1 reflector.go:357] "Starting reflector" type="*v1.UserDefinedNetwork" resyncPeriod="0s" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/userdefinednetwork/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:40.271622805Z I0313 01:17:40.271616 1 reflector.go:403] "Listing and watching" type="*v1.UserDefinedNetwork" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/userdefinednetwork/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:40.272974665Z I0313 01:17:40.272953 1 reflector.go:430] "Caches populated" type="*v1.ClusterUserDefinedNetwork" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/userdefinednetwork/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:40.273159042Z I0313 01:17:40.273135 1 reflector.go:430] "Caches populated" type="*v1.UserDefinedNetwork" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/userdefinednetwork/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:40.276940783Z I0313 01:17:40.276916 1 factory.go:1890] *v1.UserDefinedNetwork informer cache synced successfully 2026-03-13T01:17:40.276940783Z I0313 01:17:40.276930 1 factory.go:1890] *v1.ClusterUserDefinedNetwork informer cache synced successfully 2026-03-13T01:17:40.276973271Z I0313 01:17:40.276939 1 factory.go:636] Watch Factory start up complete, took: 151.022151ms 2026-03-13T01:17:40.277006048Z I0313 01:17:40.276984 1 controller.go:133] Adding controller [clustermanager-nad-controller NAD controller] event handlers 2026-03-13T01:17:40.277030497Z I0313 01:17:40.277012 1 shared_informer.go:350] "Waiting for caches to sync" controller="[clustermanager-nad-controller NAD controller]" 2026-03-13T01:17:40.277030497Z I0313 01:17:40.277026 1 shared_informer.go:357] "Caches are synced" controller="[clustermanager-nad-controller NAD controller]" 2026-03-13T01:17:40.277051055Z I0313 01:17:40.277036 1 controller.go:157] Starting controller [clustermanager-nad-controller NAD controller] with 1 workers 2026-03-13T01:17:40.277093852Z I0313 01:17:40.277075 1 network_controller.go:246] [clustermanager-nad-controller network controller]: syncing all networks 2026-03-13T01:17:40.277093852Z I0313 01:17:40.277084 1 network_controller.go:257] [clustermanager-nad-controller network controller]: finished syncing all networks. Time taken: 13.889µs 2026-03-13T01:17:40.277093852Z I0313 01:17:40.277089 1 controller.go:157] Starting controller [clustermanager-nad-controller network controller] with 1 workers 2026-03-13T01:17:40.277103291Z I0313 01:17:40.277095 1 nad_controller.go:162] [clustermanager-nad-controller NAD controller]: started 2026-03-13T01:17:40.277112191Z I0313 01:17:40.277106 1 network_cluster_controller.go:388] Initializing cluster manager network controller "default" ... 2026-03-13T01:17:40.277155897Z I0313 01:17:40.277138 1 network_cluster_controller.go:394] Cluster manager network controller "default" initialized. Took: 37.867µs 2026-03-13T01:17:40.277155897Z I0313 01:17:40.277146 1 network_cluster_controller.go:398] Cluster manager network controller "default" starting node watcher... 2026-03-13T01:17:40.277300157Z I0313 01:17:40.277283 1 network_cluster_controller.go:403] Cluster manager network controller "default" completed watch nodes. Took: 136.36µs 2026-03-13T01:17:40.277308156Z I0313 01:17:40.277300 1 zone_cluster_controller.go:217] Node master-0 has the id 2 set 2026-03-13T01:17:40.277395150Z I0313 01:17:40.277374 1 kube.go:133] Setting annotations map[k8s.ovn.org/node-id:2 k8s.ovn.org/node-transit-switch-port-ifaddr:{"ipv4":"100.88.0.2/16"}] on node master-0 2026-03-13T01:17:42.773378229Z W0313 01:17:42.773312 1 egressip_healthcheck.go:169] Health checking using insecure connection 2026-03-13T01:17:42.774350548Z I0313 01:17:42.774309 1 egressip_healthcheck.go:194] Connected to master-0 (10.128.0.2:9107) 2026-03-13T01:17:42.774367786Z I0313 01:17:42.774351 1 egressip_controller.go:436] EgressIP node reachability enabled and using gRPC port 9107 2026-03-13T01:17:42.774377945Z I0313 01:17:42.774369 1 egressservice_cluster.go:174] Starting Egress Services Controller 2026-03-13T01:17:42.774390305Z I0313 01:17:42.774381 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressservices" 2026-03-13T01:17:42.774400224Z I0313 01:17:42.774391 1 shared_informer.go:357] "Caches are synced" controller="egressservices" 2026-03-13T01:17:42.774410213Z I0313 01:17:42.774400 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressservices_services" 2026-03-13T01:17:42.774410213Z I0313 01:17:42.774405 1 shared_informer.go:357] "Caches are synced" controller="egressservices_services" 2026-03-13T01:17:42.774456610Z I0313 01:17:42.774411 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressservices_endpointslices" 2026-03-13T01:17:42.774456610Z I0313 01:17:42.774440 1 shared_informer.go:357] "Caches are synced" controller="egressservices_endpointslices" 2026-03-13T01:17:42.774456610Z I0313 01:17:42.774448 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressservices_nodes" 2026-03-13T01:17:42.774456610Z I0313 01:17:42.774452 1 shared_informer.go:357] "Caches are synced" controller="egressservices_nodes" 2026-03-13T01:17:42.774484568Z I0313 01:17:42.774456 1 egressservice_cluster.go:191] Repairing Egress Services 2026-03-13T01:17:42.774593640Z I0313 01:17:42.774560 1 kube.go:272] Setting labels map[] on node master-0 2026-03-13T01:17:42.782389576Z I0313 01:17:42.782343 1 endpointslice_mirror_controller.go:155] Starting the EndpointSlice mirror controller 2026-03-13T01:17:42.782389576Z I0313 01:17:42.782366 1 endpointslice_mirror_controller.go:156] Repairing EndpointSlice mirrors 2026-03-13T01:17:42.782550024Z I0313 01:17:42.782496 1 status_manager.go:310] Starting StatusManager with typed managers: map[adminpolicybasedexternalroutes:0xc0009e8880 egressfirewalls:0xc0009e8c80 egressqoses:0xc0009e9080] 2026-03-13T01:17:42.782587191Z I0313 01:17:42.782563 1 controller.go:133] Adding controller zone_tracker event handlers 2026-03-13T01:17:42.782663955Z I0313 01:17:42.782613 1 shared_informer.go:350] "Waiting for caches to sync" controller="zone_tracker" 2026-03-13T01:17:42.782685544Z I0313 01:17:42.782659 1 shared_informer.go:357] "Caches are synced" controller="zone_tracker" 2026-03-13T01:17:42.782699923Z I0313 01:17:42.782680 1 status_manager.go:348] StatusManager got zones update: map[master-0:{}] 2026-03-13T01:17:42.782711472Z I0313 01:17:42.782704 1 controller.go:289] Controller egressqoses_statusmanager: full reconcile 2026-03-13T01:17:42.782723151Z I0313 01:17:42.782713 1 controller.go:289] Controller adminpolicybasedexternalroutes_statusmanager: full reconcile 2026-03-13T01:17:42.782734820Z I0313 01:17:42.782724 1 controller.go:289] Controller egressfirewalls_statusmanager: full reconcile 2026-03-13T01:17:42.782746559Z I0313 01:17:42.782732 1 status_manager.go:348] StatusManager got zones update: map[master-0:{}] 2026-03-13T01:17:42.782746559Z I0313 01:17:42.782741 1 controller.go:289] Controller egressqoses_statusmanager: full reconcile 2026-03-13T01:17:42.782758448Z I0313 01:17:42.782747 1 controller.go:289] Controller adminpolicybasedexternalroutes_statusmanager: full reconcile 2026-03-13T01:17:42.782758448Z I0313 01:17:42.782752 1 controller.go:289] Controller egressfirewalls_statusmanager: full reconcile 2026-03-13T01:17:42.782770448Z I0313 01:17:42.782760 1 controller.go:157] Starting controller zone_tracker with 1 workers 2026-03-13T01:17:42.782928196Z I0313 01:17:42.782901 1 controller.go:133] Adding controller egressqoses_statusmanager event handlers 2026-03-13T01:17:42.782943985Z I0313 01:17:42.782928 1 egressservice_cluster_node.go:167] Processing sync for Egress Service node master-0 2026-03-13T01:17:42.782996831Z I0313 01:17:42.782966 1 egressservice_cluster_node.go:170] Finished syncing Egress Service node master-0: 86.703µs 2026-03-13T01:17:42.782996831Z I0313 01:17:42.782948 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressqoses_statusmanager" 2026-03-13T01:17:42.782996831Z I0313 01:17:42.782986 1 shared_informer.go:357] "Caches are synced" controller="egressqoses_statusmanager" 2026-03-13T01:17:42.783012990Z I0313 01:17:42.783001 1 status_manager.go:144] StatusManager egressqoses_statusmanager: performing a one-time startup cleanup of stale managedFields 2026-03-13T01:17:42.783012990Z I0313 01:17:42.783007 1 status_manager.go:175] StatusManager egressqoses_statusmanager: startup cleanup complete 2026-03-13T01:17:42.783037578Z I0313 01:17:42.783014 1 controller.go:157] Starting controller egressqoses_statusmanager with 1 workers 2026-03-13T01:17:42.783050227Z I0313 01:17:42.783035 1 controller.go:133] Adding controller adminpolicybasedexternalroutes_statusmanager event handlers 2026-03-13T01:17:42.783150700Z I0313 01:17:42.783124 1 shared_informer.go:350] "Waiting for caches to sync" controller="adminpolicybasedexternalroutes_statusmanager" 2026-03-13T01:17:42.783150700Z I0313 01:17:42.783135 1 shared_informer.go:357] "Caches are synced" controller="adminpolicybasedexternalroutes_statusmanager" 2026-03-13T01:17:42.783150700Z I0313 01:17:42.783143 1 status_manager.go:144] StatusManager adminpolicybasedexternalroutes_statusmanager: performing a one-time startup cleanup of stale managedFields 2026-03-13T01:17:42.783166988Z I0313 01:17:42.783148 1 status_manager.go:175] StatusManager adminpolicybasedexternalroutes_statusmanager: startup cleanup complete 2026-03-13T01:17:42.783166988Z I0313 01:17:42.783154 1 controller.go:157] Starting controller adminpolicybasedexternalroutes_statusmanager with 1 workers 2026-03-13T01:17:42.783179577Z I0313 01:17:42.783168 1 controller.go:133] Adding controller egressfirewalls_statusmanager event handlers 2026-03-13T01:17:42.783191387Z I0313 01:17:42.783180 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressfirewalls_statusmanager" 2026-03-13T01:17:42.783191387Z I0313 01:17:42.783185 1 shared_informer.go:357] "Caches are synced" controller="egressfirewalls_statusmanager" 2026-03-13T01:17:42.783204396Z I0313 01:17:42.783191 1 status_manager.go:144] StatusManager egressfirewalls_statusmanager: performing a one-time startup cleanup of stale managedFields 2026-03-13T01:17:42.783204396Z I0313 01:17:42.783195 1 status_manager.go:175] StatusManager egressfirewalls_statusmanager: startup cleanup complete 2026-03-13T01:17:42.783204396Z I0313 01:17:42.783200 1 controller.go:157] Starting controller egressfirewalls_statusmanager with 1 workers 2026-03-13T01:17:42.783217625Z I0313 01:17:42.783208 1 admin_network_policy_manager.go:105] StatusManager: performing one-time startup cleanup for ANP/BANP managedFields 2026-03-13T01:17:42.786512732Z I0313 01:17:42.786473 1 controller.go:145] Starting user-defined network controllers 2026-03-13T01:17:42.786536390Z I0313 01:17:42.786522 1 controller.go:133] Adding controller udn-namespace-controller event handlers 2026-03-13T01:17:42.786570308Z I0313 01:17:42.786546 1 controller.go:133] Adding controller user-defined-network-controller event handlers 2026-03-13T01:17:42.786570308Z I0313 01:17:42.786563 1 controller.go:133] Adding controller udn-nad-controller event handlers 2026-03-13T01:17:42.786679290Z I0313 01:17:42.786651 1 shared_informer.go:350] "Waiting for caches to sync" controller="user-defined-network-controller" 2026-03-13T01:17:42.786679290Z I0313 01:17:42.786655 1 shared_informer.go:350] "Waiting for caches to sync" controller="udn-namespace-controller" 2026-03-13T01:17:42.786679290Z I0313 01:17:42.786668 1 shared_informer.go:357] "Caches are synced" controller="user-defined-network-controller" 2026-03-13T01:17:42.786679290Z I0313 01:17:42.786672 1 shared_informer.go:357] "Caches are synced" controller="udn-namespace-controller" 2026-03-13T01:17:42.786679290Z I0313 01:17:42.786655 1 shared_informer.go:350] "Waiting for caches to sync" controller="udn-nad-controller" 2026-03-13T01:17:42.786704568Z I0313 01:17:42.786683 1 shared_informer.go:357] "Caches are synced" controller="udn-nad-controller" 2026-03-13T01:17:42.786714917Z I0313 01:17:42.786705 1 controller.go:133] Adding controller cluster-user-defined-network-controller event handlers 2026-03-13T01:17:42.786805110Z I0313 01:17:42.786783 1 shared_informer.go:350] "Waiting for caches to sync" controller="cluster-user-defined-network-controller" 2026-03-13T01:17:42.786805110Z I0313 01:17:42.786795 1 shared_informer.go:357] "Caches are synced" controller="cluster-user-defined-network-controller" 2026-03-13T01:17:42.786816880Z I0313 01:17:42.786805 1 controller.go:157] Starting controller cluster-user-defined-network-controller with 1 workers 2026-03-13T01:17:42.786924572Z I0313 01:17:42.786904 1 controller.go:157] Starting controller user-defined-network-controller with 1 workers 2026-03-13T01:17:42.786924572Z I0313 01:17:42.786915 1 controller.go:157] Starting controller udn-nad-controller with 1 workers 2026-03-13T01:17:42.786924572Z I0313 01:17:42.786921 1 controller.go:157] Starting controller udn-namespace-controller with 1 workers 2026-03-13T01:17:47.773466691Z I0313 01:17:47.773265 1 egressip_healthcheck.go:203] Closing connection with master-0 (10.128.0.2:9107) 2026-03-13T01:18:12.264944879Z I0313 01:18:12.260463 1 egressservice_cluster_node.go:167] Processing sync for Egress Service node master-0 2026-03-13T01:18:12.264944879Z I0313 01:18:12.260496 1 egressservice_cluster_node.go:170] Finished syncing Egress Service node master-0: 42.331µs kube-rbac-proxy_current.log0000640000000000000000000000216615154662741033175 0ustar0000000000000000config/pod/openshift-ovn-kubernetes/logs/ovnkube-control-plane-66b55d57d-cjmvd2026-03-13T01:12:26.210291902Z 2026-03-13T01:12:26+00:00 INFO: ovn-control-plane-metrics-cert not mounted. Waiting 20 minutes. 2026-03-13T01:14:47.013061229Z 2026-03-13T01:14:47+00:00 INFO: ovn-control-plane-metrics-certs mounted, starting kube-rbac-proxy 2026-03-13T01:14:47.052812508Z W0313 01:14:47.052625 1 deprecated.go:66] 2026-03-13T01:14:47.052812508Z ==== Removed Flag Warning ====================== 2026-03-13T01:14:47.052812508Z 2026-03-13T01:14:47.052812508Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T01:14:47.052812508Z 2026-03-13T01:14:47.052812508Z =============================================== 2026-03-13T01:14:47.052812508Z 2026-03-13T01:14:47.053173787Z I0313 01:14:47.053107 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T01:14:47.054473852Z I0313 01:14:47.054419 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T01:14:47.054771700Z I0313 01:14:47.054719 1 kube-rbac-proxy.go:395] Starting TCP socket on :9108 2026-03-13T01:14:47.055031817Z I0313 01:14:47.054999 1 kube-rbac-proxy.go:402] Listening securely on :9108 ovnkube-cluster-manager_previous.log0000640000000000000000000004171215154662741035115 0ustar0000000000000000config/pod/openshift-ovn-kubernetes/logs/ovnkube-control-plane-66b55d57d-cjmvd2026-03-13T01:12:49.078034915Z I0313 01:12:49.078013 1 kube.go:313] Updating status on node master-0 2026-03-13T01:12:49.089601779Z I0313 01:12:49.089531 1 network_cluster_controller.go:403] Cluster manager network controller "default" completed watch nodes. Took: 11.993226ms 2026-03-13T01:12:49.090295249Z I0313 01:12:49.090241 1 kube.go:133] Setting annotations map[k8s.ovn.org/node-id:2 k8s.ovn.org/node-transit-switch-port-ifaddr:{"ipv4":"100.88.0.2/16"}] on node master-0 2026-03-13T01:12:49.097235073Z W0313 01:12:49.097195 1 egressip_event_handler.go:51] Egress node initialization error: failed to get egress IP config for node master-0: unable to generate egress IP config for node master-0: k8s.ovn.org/node-primary-ifaddr annotation not found for node "master-0" 2026-03-13T01:12:49.097274174Z I0313 01:12:49.097256 1 egressip_controller.go:436] EgressIP node reachability enabled and using gRPC port 9107 2026-03-13T01:12:49.097274174Z I0313 01:12:49.097270 1 egressservice_cluster.go:174] Starting Egress Services Controller 2026-03-13T01:12:49.097345646Z I0313 01:12:49.097309 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressservices" 2026-03-13T01:12:49.097345646Z I0313 01:12:49.097328 1 shared_informer.go:357] "Caches are synced" controller="egressservices" 2026-03-13T01:12:49.097345646Z I0313 01:12:49.097335 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressservices_services" 2026-03-13T01:12:49.097345646Z I0313 01:12:49.097341 1 shared_informer.go:357] "Caches are synced" controller="egressservices_services" 2026-03-13T01:12:49.097403208Z I0313 01:12:49.097346 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressservices_endpointslices" 2026-03-13T01:12:49.097403208Z I0313 01:12:49.097358 1 shared_informer.go:357] "Caches are synced" controller="egressservices_endpointslices" 2026-03-13T01:12:49.097403208Z I0313 01:12:49.097364 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressservices_nodes" 2026-03-13T01:12:49.097403208Z I0313 01:12:49.097396 1 shared_informer.go:357] "Caches are synced" controller="egressservices_nodes" 2026-03-13T01:12:49.097421348Z I0313 01:12:49.097402 1 egressservice_cluster.go:191] Repairing Egress Services 2026-03-13T01:12:49.097463209Z W0313 01:12:49.097416 1 egressip_event_handler.go:106] Egress node initialization error: failed to get egress IP config for node master-0: unable to generate egress IP config for node master-0: k8s.ovn.org/node-primary-ifaddr annotation not found for node "master-0" 2026-03-13T01:12:49.097479910Z I0313 01:12:49.097444 1 kube.go:272] Setting labels map[] on node master-0 2026-03-13T01:12:49.104117745Z I0313 01:12:49.104049 1 endpointslice_mirror_controller.go:155] Starting the EndpointSlice mirror controller 2026-03-13T01:12:49.104117745Z I0313 01:12:49.104080 1 endpointslice_mirror_controller.go:156] Repairing EndpointSlice mirrors 2026-03-13T01:12:49.104254289Z I0313 01:12:49.104177 1 status_manager.go:310] Starting StatusManager with typed managers: map[adminpolicybasedexternalroutes:0xc0049947c0 egressfirewalls:0xc004994bc0 egressqoses:0xc004994fc0] 2026-03-13T01:12:49.104272030Z I0313 01:12:49.104252 1 controller.go:133] Adding controller zone_tracker event handlers 2026-03-13T01:12:49.104381753Z I0313 01:12:49.104332 1 shared_informer.go:350] "Waiting for caches to sync" controller="zone_tracker" 2026-03-13T01:12:49.104381753Z I0313 01:12:49.104358 1 shared_informer.go:357] "Caches are synced" controller="zone_tracker" 2026-03-13T01:12:49.104443665Z I0313 01:12:49.104393 1 status_manager.go:348] StatusManager got zones update: map[unknown:{}] 2026-03-13T01:12:49.104443665Z I0313 01:12:49.104426 1 status_manager.go:348] StatusManager got zones update: map[unknown:{}] 2026-03-13T01:12:49.104460375Z I0313 01:12:49.104439 1 controller.go:157] Starting controller zone_tracker with 1 workers 2026-03-13T01:12:49.104475786Z I0313 01:12:49.104464 1 controller.go:133] Adding controller adminpolicybasedexternalroutes_statusmanager event handlers 2026-03-13T01:12:49.104521457Z I0313 01:12:49.104492 1 shared_informer.go:350] "Waiting for caches to sync" controller="adminpolicybasedexternalroutes_statusmanager" 2026-03-13T01:12:49.104521457Z I0313 01:12:49.104507 1 shared_informer.go:357] "Caches are synced" controller="adminpolicybasedexternalroutes_statusmanager" 2026-03-13T01:12:49.104538557Z I0313 01:12:49.104520 1 status_manager.go:144] StatusManager adminpolicybasedexternalroutes_statusmanager: performing a one-time startup cleanup of stale managedFields 2026-03-13T01:12:49.104538557Z I0313 01:12:49.104532 1 status_manager.go:175] StatusManager adminpolicybasedexternalroutes_statusmanager: startup cleanup complete 2026-03-13T01:12:49.104554618Z I0313 01:12:49.104541 1 controller.go:157] Starting controller adminpolicybasedexternalroutes_statusmanager with 1 workers 2026-03-13T01:12:49.104599859Z I0313 01:12:49.104575 1 controller.go:133] Adding controller egressfirewalls_statusmanager event handlers 2026-03-13T01:12:49.104615659Z I0313 01:12:49.104596 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressfirewalls_statusmanager" 2026-03-13T01:12:49.104615659Z I0313 01:12:49.104608 1 shared_informer.go:357] "Caches are synced" controller="egressfirewalls_statusmanager" 2026-03-13T01:12:49.104667881Z I0313 01:12:49.104620 1 status_manager.go:144] StatusManager egressfirewalls_statusmanager: performing a one-time startup cleanup of stale managedFields 2026-03-13T01:12:49.104699632Z I0313 01:12:49.104676 1 status_manager.go:175] StatusManager egressfirewalls_statusmanager: startup cleanup complete 2026-03-13T01:12:49.104699632Z I0313 01:12:49.104690 1 controller.go:157] Starting controller egressfirewalls_statusmanager with 1 workers 2026-03-13T01:12:49.104746813Z I0313 01:12:49.104717 1 controller.go:133] Adding controller egressqoses_statusmanager event handlers 2026-03-13T01:12:49.104763934Z I0313 01:12:49.104748 1 shared_informer.go:350] "Waiting for caches to sync" controller="egressqoses_statusmanager" 2026-03-13T01:12:49.104779114Z I0313 01:12:49.104759 1 shared_informer.go:357] "Caches are synced" controller="egressqoses_statusmanager" 2026-03-13T01:12:49.104779114Z I0313 01:12:49.104772 1 status_manager.go:144] StatusManager egressqoses_statusmanager: performing a one-time startup cleanup of stale managedFields 2026-03-13T01:12:49.104795004Z I0313 01:12:49.104767 1 egressservice_cluster_node.go:167] Processing sync for Egress Service node master-0 2026-03-13T01:12:49.104836106Z I0313 01:12:49.104805 1 egressservice_cluster_node.go:170] Finished syncing Egress Service node master-0: 47.222µs 2026-03-13T01:12:49.104836106Z I0313 01:12:49.104782 1 status_manager.go:175] StatusManager egressqoses_statusmanager: startup cleanup complete 2026-03-13T01:12:49.104853446Z I0313 01:12:49.104832 1 controller.go:157] Starting controller egressqoses_statusmanager with 1 workers 2026-03-13T01:12:49.104868647Z I0313 01:12:49.104849 1 admin_network_policy_manager.go:105] StatusManager: performing one-time startup cleanup for ANP/BANP managedFields 2026-03-13T01:12:49.109169827Z I0313 01:12:49.109109 1 controller.go:145] Starting user-defined network controllers 2026-03-13T01:12:49.109204288Z I0313 01:12:49.109182 1 controller.go:133] Adding controller udn-namespace-controller event handlers 2026-03-13T01:12:49.109318101Z I0313 01:12:49.109287 1 controller.go:133] Adding controller user-defined-network-controller event handlers 2026-03-13T01:12:49.109407644Z I0313 01:12:49.109381 1 shared_informer.go:350] "Waiting for caches to sync" controller="user-defined-network-controller" 2026-03-13T01:12:49.109463085Z I0313 01:12:49.109444 1 shared_informer.go:357] "Caches are synced" controller="user-defined-network-controller" 2026-03-13T01:12:49.109507336Z I0313 01:12:49.109298 1 shared_informer.go:350] "Waiting for caches to sync" controller="udn-namespace-controller" 2026-03-13T01:12:49.109559338Z I0313 01:12:49.109540 1 shared_informer.go:357] "Caches are synced" controller="udn-namespace-controller" 2026-03-13T01:12:49.109681971Z I0313 01:12:49.109316 1 controller.go:133] Adding controller cluster-user-defined-network-controller event handlers 2026-03-13T01:12:49.109757263Z I0313 01:12:49.109737 1 shared_informer.go:350] "Waiting for caches to sync" controller="cluster-user-defined-network-controller" 2026-03-13T01:12:49.109807905Z I0313 01:12:49.109790 1 shared_informer.go:357] "Caches are synced" controller="cluster-user-defined-network-controller" 2026-03-13T01:12:49.109854176Z I0313 01:12:49.109324 1 controller.go:133] Adding controller udn-nad-controller event handlers 2026-03-13T01:12:49.109912228Z I0313 01:12:49.109894 1 shared_informer.go:350] "Waiting for caches to sync" controller="udn-nad-controller" 2026-03-13T01:12:49.109975969Z I0313 01:12:49.109958 1 shared_informer.go:357] "Caches are synced" controller="udn-nad-controller" 2026-03-13T01:12:49.110165065Z I0313 01:12:49.110129 1 controller.go:157] Starting controller cluster-user-defined-network-controller with 1 workers 2026-03-13T01:12:49.110223296Z I0313 01:12:49.110203 1 controller.go:157] Starting controller user-defined-network-controller with 1 workers 2026-03-13T01:12:49.110297548Z I0313 01:12:49.110278 1 controller.go:157] Starting controller udn-nad-controller with 1 workers 2026-03-13T01:12:49.110348630Z I0313 01:12:49.110331 1 controller.go:157] Starting controller udn-namespace-controller with 1 workers 2026-03-13T01:12:58.290124293Z I0313 01:12:58.289989 1 status_manager.go:348] StatusManager got zones update: map[master-0:{}] 2026-03-13T01:12:58.290124293Z W0313 01:12:58.290065 1 egressip_event_handler.go:106] Egress node initialization error: failed to get egress IP config for node master-0: unable to generate egress IP config for node master-0: k8s.ovn.org/node-primary-ifaddr annotation not found for node "master-0" 2026-03-13T01:12:58.290124293Z I0313 01:12:58.290068 1 controller.go:289] Controller adminpolicybasedexternalroutes_statusmanager: full reconcile 2026-03-13T01:12:58.290124293Z I0313 01:12:58.290089 1 controller.go:289] Controller egressfirewalls_statusmanager: full reconcile 2026-03-13T01:12:58.290124293Z I0313 01:12:58.290099 1 controller.go:289] Controller egressqoses_statusmanager: full reconcile 2026-03-13T01:13:09.915265714Z I0313 01:13:09.915176 1 egressservice_cluster_node.go:167] Processing sync for Egress Service node master-0 2026-03-13T01:13:09.915265714Z I0313 01:13:09.915224 1 egressservice_cluster_node.go:170] Finished syncing Egress Service node master-0: 63.502µs 2026-03-13T01:15:33.090686461Z E0313 01:15:33.090601 1 leaderelection.go:429] Failed to update lock optimistically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T01:16:33.093061894Z E0313 01:16:33.092970 1 leaderelection.go:436] error retrieving resource lock openshift-ovn-kubernetes/ovn-kubernetes-master: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io ovn-kubernetes-master) 2026-03-13T01:16:46.087612373Z E0313 01:16:46.087451 1 leaderelection.go:429] Failed to update lock optimistically: Put "https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-ovn-kubernetes/leases/ovn-kubernetes-master": context deadline exceeded, falling back to slow path 2026-03-13T01:16:46.087732836Z E0313 01:16:46.087705 1 leaderelection.go:436] error retrieving resource lock openshift-ovn-kubernetes/ovn-kubernetes-master: client rate limiter Wait returned an error: context deadline exceeded 2026-03-13T01:16:46.087750487Z I0313 01:16:46.087739 1 leaderelection.go:297] failed to renew lease openshift-ovn-kubernetes/ovn-kubernetes-master: context deadline exceeded 2026-03-13T01:17:20.092705619Z E0313 01:17:20.092592 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T01:17:20.092845972Z I0313 01:17:20.092799 1 ovnkube.go:406] No longer leader; exiting 2026-03-13T01:17:20.092971606Z I0313 01:17:20.092875 1 ovnkube.go:631] Stopping ovnkube... 2026-03-13T01:17:20.093249283Z I0313 01:17:20.093201 1 metrics.go:545] Stopping metrics server at address "127.0.0.1:29108" 2026-03-13T01:17:20.093347226Z I0313 01:17:20.093288 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-ovn-kubernetes", Name:"ovn-kubernetes-master", UID:"33899c2d-dd08-4003-a188-0c468c86675d", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"9104", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' ovnkube-control-plane-66b55d57d-cjmvd stopped leading 2026-03-13T01:17:20.093347226Z I0313 01:17:20.093329 1 clustermanager.go:234] Stopping the cluster manager 2026-03-13T01:17:20.093384687Z I0313 01:17:20.093373 1 egressservice_cluster.go:222] Shutting down Egress Services controller 2026-03-13T01:17:20.093442149Z I0313 01:17:20.093411 1 endpointslice_mirror_controller.go:176] Shutting down endpointslice-mirror-controller.k8s.ovn.org 2026-03-13T01:17:20.093667425Z I0313 01:17:20.093576 1 reflector.go:363] "Stopping reflector" type="*v1.EgressService" resyncPeriod="0s" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/egressservice/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:20.093989493Z I0313 01:17:20.093916 1 reflector.go:363] "Stopping reflector" type="*v1.Pod" resyncPeriod="0s" reflector="k8s.io/client-go/informers/factory.go:160" 2026-03-13T01:17:20.094147568Z I0313 01:17:20.094087 1 reflector.go:363] "Stopping reflector" type="*v1.NetworkAttachmentDefinition" resyncPeriod="0s" reflector="github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/client/informers/externalversions/factory.go:117" 2026-03-13T01:17:20.094164618Z I0313 01:17:20.094143 1 reflector.go:363] "Stopping reflector" type="*v1.Namespace" resyncPeriod="0s" reflector="k8s.io/client-go/informers/factory.go:160" 2026-03-13T01:17:20.094297292Z I0313 01:17:20.094247 1 reflector.go:363] "Stopping reflector" type="*v1.EgressQoS" resyncPeriod="0s" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/egressqos/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:20.095097023Z I0313 01:17:20.094353 1 reflector.go:363] "Stopping reflector" type="*v1.UserDefinedNetwork" resyncPeriod="0s" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/userdefinednetwork/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:20.095097023Z I0313 01:17:20.094472 1 reflector.go:363] "Stopping reflector" type="*v1.EgressFirewall" resyncPeriod="0s" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/egressfirewall/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:20.095097023Z I0313 01:17:20.094512 1 reflector.go:363] "Stopping reflector" type="*v1.Service" resyncPeriod="0s" reflector="k8s.io/client-go/informers/factory.go:160" 2026-03-13T01:17:20.095097023Z I0313 01:17:20.094600 1 reflector.go:363] "Stopping reflector" type="*v1.EndpointSlice" resyncPeriod="0s" reflector="k8s.io/client-go/informers/factory.go:160" 2026-03-13T01:17:20.095097023Z I0313 01:17:20.094729 1 reflector.go:363] "Stopping reflector" type="*v1.AdminPolicyBasedExternalRoute" resyncPeriod="0s" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/adminpolicybasedroute/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:20.095097023Z I0313 01:17:20.094770 1 reflector.go:363] "Stopping reflector" type="*v1.Node" resyncPeriod="0s" reflector="k8s.io/client-go/informers/factory.go:160" 2026-03-13T01:17:20.095097023Z I0313 01:17:20.094892 1 reflector.go:363] "Stopping reflector" type="*v1alpha1.IPAMClaim" resyncPeriod="0s" reflector="github.com/k8snetworkplumbingwg/ipamclaims/pkg/crd/ipamclaims/v1alpha1/apis/informers/externalversions/factory.go:141" 2026-03-13T01:17:20.095254888Z I0313 01:17:20.095188 1 reflector.go:363] "Stopping reflector" type="*v1.EgressIP" resyncPeriod="0s" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/egressip/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:20.095439513Z I0313 01:17:20.095386 1 reflector.go:363] "Stopping reflector" type="*v1.ClusterUserDefinedNetwork" resyncPeriod="0s" reflector="github.com/openshift/ovn-kubernetes/go-controller/pkg/crd/userdefinednetwork/v1/apis/informers/externalversions/factory.go:140" 2026-03-13T01:17:20.106925783Z I0313 01:17:20.106841 1 factory.go:642] Stopping watch factory 2026-03-13T01:17:20.106925783Z I0313 01:17:20.106905 1 ovnkube.go:635] Stopped ovnkube config/pod/openshift-ovn-kubernetes/ovnkube-control-plane-66b55d57d-cjmvd.json0000640000000000000000000002350015154662741025717 0ustar0000000000000000{"metadata":{"name":"ovnkube-control-plane-66b55d57d-cjmvd","generateName":"ovnkube-control-plane-66b55d57d-","namespace":"openshift-ovn-kubernetes","uid":"1308fba1-a50d-48b3-b272-7bef44727b7f","resourceVersion":"9883","creationTimestamp":"2026-03-13T01:12:21Z","labels":{"app":"ovnkube-control-plane","component":"network","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-hash":"66b55d57d","type":"infra"},"annotations":{"networkoperator.openshift.io/cluster-network-cidr":"10.128.0.0/16","networkoperator.openshift.io/hybrid-overlay-status":"disabled","networkoperator.openshift.io/ip-family-mode":"single-stack"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ovnkube-control-plane-66b55d57d","uid":"d2157ce2-8b1e-422a-833e-428b0bd1b7a4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"ovnkube-config","configMap":{"name":"ovnkube-config","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovn-control-plane-metrics-cert","secret":{"secretName":"ovn-control-plane-metrics-cert","defaultMode":420,"optional":true}},{"name":"kube-api-access-zv2rb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","command":["/bin/bash","-c","#!/bin/bash\nset -euo pipefail\nTLS_PK=/etc/pki/tls/metrics-cert/tls.key\nTLS_CERT=/etc/pki/tls/metrics-cert/tls.crt\n# As the secret mount is optional we must wait for the files to be present.\n# The service is created in monitor.yaml and this is created in sdn.yaml.\nTS=$(date +%s)\nWARN_TS=$(( ${TS} + $(( 20 * 60)) ))\nHAS_LOGGED_INFO=0\n\nlog_missing_certs(){\n CUR_TS=$(date +%s)\n if [[ \"${CUR_TS}\" -gt \"WARN_TS\" ]]; then\n echo $(date -Iseconds) WARN: ovn-control-plane-metrics-cert not mounted after 20 minutes.\n elif [[ \"${HAS_LOGGED_INFO}\" -eq 0 ]] ; then\n echo $(date -Iseconds) INFO: ovn-control-plane-metrics-cert not mounted. Waiting 20 minutes.\n HAS_LOGGED_INFO=1\n fi\n}\nwhile [[ ! -f \"${TLS_PK}\" || ! -f \"${TLS_CERT}\" ]] ; do\n log_missing_certs\n sleep 5\ndone\n\necho $(date -Iseconds) INFO: ovn-control-plane-metrics-certs mounted, starting kube-rbac-proxy\nexec /usr/bin/kube-rbac-proxy \\\n --logtostderr \\\n --secure-listen-address=:9108 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 \\\n --upstream=http://127.0.0.1:29108/ \\\n --tls-private-key-file=${TLS_PK} \\\n --tls-cert-file=${TLS_CERT}\n"],"ports":[{"name":"https","hostPort":9108,"containerPort":9108,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"ovn-control-plane-metrics-cert","readOnly":true,"mountPath":"/etc/pki/tls/metrics-cert"},{"name":"kube-api-access-zv2rb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"ovnkube-cluster-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\novn_v4_join_subnet_opt=\nif [[ \"\" != \"\" ]]; then\n ovn_v4_join_subnet_opt=\"--gateway-v4-join-subnet \"\nfi\novn_v6_join_subnet_opt=\nif [[ \"\" != \"\" ]]; then\n ovn_v6_join_subnet_opt=\"--gateway-v6-join-subnet \"\nfi\n\novn_v4_transit_switch_subnet_opt=\nif [[ \"\" != \"\" ]]; then\n ovn_v4_transit_switch_subnet_opt=\"--cluster-manager-v4-transit-switch-subnet \"\nfi\novn_v6_transit_switch_subnet_opt=\nif [[ \"\" != \"\" ]]; then\n ovn_v6_transit_switch_subnet_opt=\"--cluster-manager-v6-transit-switch-subnet \"\nfi\n\ndns_name_resolver_enabled_flag=\nif [[ \"false\" == \"true\" ]]; then\n dns_name_resolver_enabled_flag=\"--enable-dns-name-resolver\"\nfi\n\npersistent_ips_enabled_flag=\nif [[ \"true\" == \"true\" ]]; then\n persistent_ips_enabled_flag=\"--enable-persistent-ips\"\nfi\n\n# This is needed so that converting clusters from GA to TP\n# will rollout control plane pods as well\nnetwork_segmentation_enabled_flag=\nmulti_network_enabled_flag=\nif [[ \"true\" == \"true\" ]]; then\n multi_network_enabled_flag=\"--enable-multi-network\"\n network_segmentation_enabled_flag=\"--enable-network-segmentation\"\nfi\n\nroute_advertisements_enable_flag=\nif [[ \"false\" == \"true\" ]]; then\n route_advertisements_enable_flag=\"--enable-route-advertisements\"\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - ovnkube-control-plane - start ovnkube --init-cluster-manager ${K8S_NODE}\"\nexec /usr/bin/ovnkube \\\n --enable-interconnect \\\n --init-cluster-manager \"${K8S_NODE}\" \\\n --config-file=/run/ovnkube-config/ovnkube.conf \\\n --loglevel \"${OVN_KUBE_LOG_LEVEL}\" \\\n --metrics-bind-address \"127.0.0.1:29108\" \\\n --metrics-enable-pprof \\\n --metrics-enable-config-duration \\\n ${ovn_v4_join_subnet_opt} \\\n ${ovn_v6_join_subnet_opt} \\\n ${ovn_v4_transit_switch_subnet_opt} \\\n ${ovn_v6_transit_switch_subnet_opt} \\\n ${dns_name_resolver_enabled_flag} \\\n ${persistent_ips_enabled_flag} \\\n ${multi_network_enabled_flag} \\\n ${network_segmentation_enabled_flag} \\\n ${route_advertisements_enable_flag}\n"],"ports":[{"name":"metrics-port","hostPort":29108,"containerPort":29108,"protocol":"TCP"}],"env":[{"name":"OVN_KUBE_LOG_LEVEL","value":"4"},{"name":"K8S_NODE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"300Mi"}},"volumeMounts":[{"name":"ovnkube-config","mountPath":"/run/ovnkube-config/"},{"name":"env-overrides","mountPath":"/env"},{"name":"kube-api-access-zv2rb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"Default","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ovn-kubernetes-control-plane","serviceAccount":"ovn-kubernetes-control-plane","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists"},{"key":"node.kubernetes.io/not-ready","operator":"Exists"},{"key":"node.kubernetes.io/unreachable","operator":"Exists"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:12:49Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:12:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:12:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T01:12:21Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-13T01:12:26Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://b1a3f0aaa5bfa331e385a253d06037bc576451a7d72651b9001c746da55121ba","started":true,"volumeMounts":[{"name":"ovn-control-plane-metrics-cert","mountPath":"/etc/pki/tls/metrics-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zv2rb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"ovnkube-cluster-manager","state":{"running":{"startedAt":"2026-03-13T01:17:38Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T01:12:48Z","finishedAt":"2026-03-13T01:17:20Z","containerID":"cri-o://0743267ed603ff9ac6856c0cefcbee7aeda537c3eb2e7c92d9ca09c61963bcad"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://f3373c04dfe5b06ce5689672c5fa9716a2e2ff1f88c17517721cb216726a9cc3","started":true,"volumeMounts":[{"name":"ovnkube-config","mountPath":"/run/ovnkube-config/"},{"name":"env-overrides","mountPath":"/env"},{"name":"kube-api-access-zv2rb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-multus/logs/network-metrics-daemon-zh5fh/kube-rbac-proxy_current.log0000640000000000000000000000156615154662741030503 0ustar00000000000000002026-03-13T01:14:36.191068975Z W0313 01:14:36.190891 1 deprecated.go:66] 2026-03-13T01:14:36.191068975Z ==== Removed Flag Warning ====================== 2026-03-13T01:14:36.191068975Z 2026-03-13T01:14:36.191068975Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T01:14:36.191068975Z 2026-03-13T01:14:36.191068975Z =============================================== 2026-03-13T01:14:36.191068975Z 2026-03-13T01:14:36.191466905Z I0313 01:14:36.191440 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T01:14:36.192742490Z I0313 01:14:36.192714 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T01:14:36.193063538Z I0313 01:14:36.193001 1 kube-rbac-proxy.go:395] Starting TCP socket on :8443 2026-03-13T01:14:36.195081432Z I0313 01:14:36.195050 1 kube-rbac-proxy.go:402] Listening securely on :8443 config/pod/openshift-multus/logs/network-metrics-daemon-zh5fh/network-metrics-daemon_current.log0000640000000000000000000003437515154662741032073 0ustar00000000000000002026-03-13T01:14:35.579826410Z I0313 01:14:35.578121 1 controller.go:192] Received pod 'installer-2-master-0' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578129 1 controller.go:151] Successfully synced 'openshift-kube-controller-manager/installer-2-master-0' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578132 1 controller.go:192] Received pod 'openshift-kube-scheduler-operator-5c74bfc494-wbmqn' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578143 1 controller.go:151] Successfully synced 'openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-wbmqn' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578146 1 controller.go:192] Received pod 'installer-4-master-0' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578154 1 controller.go:151] Successfully synced 'openshift-kube-scheduler/installer-4-master-0' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578158 1 controller.go:192] Received pod 'installer-5-master-0' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578166 1 controller.go:151] Successfully synced 'openshift-kube-scheduler/installer-5-master-0' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578170 1 controller.go:192] Received pod 'kube-storage-version-migrator-operator-7f65c457f5-v9nfg' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578179 1 controller.go:151] Successfully synced 'openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-v9nfg' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578183 1 controller.go:192] Received pod 'migrator-57ccdf9b5-kxxzc' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578196 1 controller.go:151] Successfully synced 'openshift-kube-storage-version-migrator/migrator-57ccdf9b5-kxxzc' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578199 1 controller.go:192] Received pod 'cluster-baremetal-operator-5cdb4c5598-47sjr' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578210 1 controller.go:151] Successfully synced 'openshift-machine-api/cluster-baremetal-operator-5cdb4c5598-47sjr' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578213 1 controller.go:192] Received pod 'machine-config-operator-fdb5c78b5-6slg8' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578227 1 controller.go:151] Successfully synced 'openshift-machine-config-operator/machine-config-operator-fdb5c78b5-6slg8' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578230 1 controller.go:192] Received pod 'marketplace-operator-64bf9778cb-dszg5' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578240 1 controller.go:151] Successfully synced 'openshift-marketplace/marketplace-operator-64bf9778cb-dszg5' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578243 1 controller.go:192] Received pod 'cluster-monitoring-operator-674cbfbd9d-2tr2t' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578252 1 controller.go:151] Successfully synced 'openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-2tr2t' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578256 1 controller.go:192] Received pod 'multus-admission-controller-8d675b596-tq7n6' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578264 1 controller.go:151] Successfully synced 'openshift-multus/multus-admission-controller-8d675b596-tq7n6' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578268 1 controller.go:192] Received pod 'network-metrics-daemon-zh5fh' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578277 1 controller.go:151] Successfully synced 'openshift-multus/network-metrics-daemon-zh5fh' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578280 1 controller.go:192] Received pod 'network-check-target-xs8pt' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578289 1 controller.go:151] Successfully synced 'openshift-network-diagnostics/network-check-target-xs8pt' 2026-03-13T01:14:35.579826410Z I0313 01:14:35.578294 1 controller.go:192] Received pod 'apiserver-78885b775b-jrrjv' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578303 1 controller.go:151] Successfully synced 'openshift-oauth-apiserver/apiserver-78885b775b-jrrjv' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578306 1 controller.go:192] Received pod 'operator-controller-controller-manager-6598bfb6c4-2wh5w' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578316 1 controller.go:151] Successfully synced 'openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-2wh5w' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578319 1 controller.go:192] Received pod 'catalog-operator-7d9c49f57b-h46pz' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578329 1 controller.go:151] Successfully synced 'openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-h46pz' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578332 1 controller.go:192] Received pod 'olm-operator-d64cfc9db-8l7kq' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578342 1 controller.go:151] Successfully synced 'openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-8l7kq' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578345 1 controller.go:192] Received pod 'package-server-manager-854648ff6d-nrzpj' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578355 1 controller.go:151] Successfully synced 'openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-nrzpj' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578359 1 controller.go:192] Received pod 'service-ca-operator-69b6fc6b88-2v42g' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578369 1 controller.go:151] Successfully synced 'openshift-service-ca-operator/service-ca-operator-69b6fc6b88-2v42g' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578373 1 controller.go:192] Received pod 'service-ca-84bfdbbb7f-qr9tk' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578381 1 controller.go:151] Successfully synced 'openshift-service-ca/service-ca-84bfdbbb7f-qr9tk' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578385 1 controller.go:192] Received pod 'control-plane-machine-set-operator-6686554ddc-w6qs7' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578394 1 controller.go:151] Successfully synced 'openshift-machine-api/control-plane-machine-set-operator-6686554ddc-w6qs7' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578398 1 controller.go:192] Received pod 'route-controller-manager-5dc55b5d9c-nlg6m' 2026-03-13T01:14:35.579905372Z I0313 01:14:35.578413 1 controller.go:151] Successfully synced 'openshift-route-controller-manager/route-controller-manager-5dc55b5d9c-nlg6m' 2026-03-13T01:14:35.584854785Z I0313 01:14:35.581821 1 controller.go:192] Received pod 'controller-manager-757fb68448-cj9p5' 2026-03-13T01:14:35.584854785Z I0313 01:14:35.581867 1 controller.go:151] Successfully synced 'openshift-controller-manager/controller-manager-757fb68448-cj9p5' 2026-03-13T01:14:36.280824018Z I0313 01:14:36.280682 1 controller.go:192] Received pod 'cloud-credential-operator-55d85b7b47-qslvf' 2026-03-13T01:14:36.280824018Z I0313 01:14:36.280719 1 controller.go:151] Successfully synced 'openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47-qslvf' 2026-03-13T01:14:36.358592499Z I0313 01:14:36.358497 1 controller.go:192] Received pod 'installer-3-master-0' 2026-03-13T01:14:36.358592499Z I0313 01:14:36.358538 1 controller.go:151] Successfully synced 'openshift-kube-controller-manager/installer-3-master-0' 2026-03-13T01:14:36.376647154Z I0313 01:14:36.375242 1 controller.go:151] Successfully synced 'openshift-kube-controller-manager/installer-2-master-0' 2026-03-13T01:14:37.192199613Z I0313 01:14:37.192150 1 controller.go:151] Successfully synced 'openshift-kube-controller-manager/installer-1-master-0' 2026-03-13T01:14:37.527654172Z I0313 01:14:37.525497 1 controller.go:192] Received pod 'redhat-marketplace-29mns' 2026-03-13T01:14:37.527654172Z I0313 01:14:37.525543 1 controller.go:151] Successfully synced 'openshift-marketplace/redhat-marketplace-29mns' 2026-03-13T01:14:37.675827626Z I0313 01:14:37.675743 1 controller.go:192] Received pod 'cluster-samples-operator-664cb58b85-2xfpz' 2026-03-13T01:14:37.675827626Z I0313 01:14:37.675781 1 controller.go:151] Successfully synced 'openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85-2xfpz' 2026-03-13T01:14:37.734724300Z I0313 01:14:37.734164 1 controller.go:192] Received pod 'redhat-operators-lb5rz' 2026-03-13T01:14:37.734724300Z I0313 01:14:37.734203 1 controller.go:151] Successfully synced 'openshift-marketplace/redhat-operators-lb5rz' 2026-03-13T01:14:37.911388489Z I0313 01:14:37.910439 1 controller.go:192] Received pod 'revision-pruner-6-master-0' 2026-03-13T01:14:37.911388489Z I0313 01:14:37.910477 1 controller.go:151] Successfully synced 'openshift-kube-scheduler/revision-pruner-6-master-0' 2026-03-13T01:14:38.384199212Z I0313 01:14:38.381195 1 controller.go:151] Successfully synced 'openshift-kube-scheduler/installer-5-master-0' 2026-03-13T01:14:38.780294831Z I0313 01:14:38.780053 1 controller.go:192] Received pod 'installer-6-master-0' 2026-03-13T01:14:38.780294831Z I0313 01:14:38.780121 1 controller.go:151] Successfully synced 'openshift-kube-scheduler/installer-6-master-0' 2026-03-13T01:17:38.328595870Z I0313 01:17:38.328509 1 controller.go:192] Received pod 'cluster-autoscaler-operator-69576476f7-2q4qb' 2026-03-13T01:17:38.328688253Z I0313 01:17:38.328604 1 controller.go:151] Successfully synced 'openshift-machine-api/cluster-autoscaler-operator-69576476f7-2q4qb' 2026-03-13T01:17:38.341681006Z I0313 01:17:38.341500 1 controller.go:151] Successfully synced 'openshift-etcd/etcd-master-0-master-0' 2026-03-13T01:17:38.358425074Z I0313 01:17:38.356761 1 controller.go:192] Received pod 'packageserver-68f6795949-v9w8g' 2026-03-13T01:17:38.358425074Z I0313 01:17:38.356832 1 controller.go:151] Successfully synced 'openshift-operator-lifecycle-manager/packageserver-68f6795949-v9w8g' 2026-03-13T01:17:38.365907563Z I0313 01:17:38.365826 1 controller.go:192] Received pod 'insights-operator-8f89dfddd-6k2t7' 2026-03-13T01:17:38.365907563Z I0313 01:17:38.365898 1 controller.go:151] Successfully synced 'openshift-insights/insights-operator-8f89dfddd-6k2t7' 2026-03-13T01:17:38.365961329Z I0313 01:17:38.365909 1 controller.go:192] Received pod 'community-operators-cpp59' 2026-03-13T01:17:38.365961329Z I0313 01:17:38.365927 1 controller.go:151] Successfully synced 'openshift-marketplace/community-operators-cpp59' 2026-03-13T01:17:38.366865772Z I0313 01:17:38.366831 1 controller.go:192] Received pod 'certified-operators-9zvz2' 2026-03-13T01:17:38.366893130Z I0313 01:17:38.366872 1 controller.go:151] Successfully synced 'openshift-marketplace/certified-operators-9zvz2' 2026-03-13T01:17:38.606114506Z I0313 01:17:38.605913 1 controller.go:151] Successfully synced 'openshift-kube-scheduler/installer-4-master-0' 2026-03-13T01:17:46.829994855Z I0313 01:17:46.829911 1 controller.go:151] Successfully synced 'openshift-marketplace/redhat-marketplace-29mns' 2026-03-13T01:17:49.196880661Z I0313 01:17:49.196775 1 controller.go:151] Successfully synced 'openshift-marketplace/community-operators-cpp59' 2026-03-13T01:17:49.544398971Z I0313 01:17:49.544328 1 controller.go:151] Successfully synced 'openshift-marketplace/redhat-operators-lb5rz' 2026-03-13T01:17:56.354131863Z I0313 01:17:56.354022 1 controller.go:192] Received pod 'installer-3-retry-1-master-0' 2026-03-13T01:17:56.354131863Z I0313 01:17:56.354119 1 controller.go:151] Successfully synced 'openshift-kube-controller-manager/installer-3-retry-1-master-0' 2026-03-13T01:18:00.410230892Z I0313 01:18:00.410157 1 controller.go:192] Received pod 'redhat-operators-k52lh' 2026-03-13T01:18:00.410230892Z I0313 01:18:00.410208 1 controller.go:151] Successfully synced 'openshift-marketplace/redhat-operators-k52lh' 2026-03-13T01:18:00.492703009Z I0313 01:18:00.492294 1 controller.go:192] Received pod 'redhat-marketplace-z254g' 2026-03-13T01:18:00.492703009Z I0313 01:18:00.492368 1 controller.go:151] Successfully synced 'openshift-marketplace/redhat-marketplace-z254g' 2026-03-13T01:18:00.494066545Z I0313 01:18:00.494006 1 controller.go:192] Received pod 'community-operators-bbptx' 2026-03-13T01:18:00.494120887Z I0313 01:18:00.494072 1 controller.go:151] Successfully synced 'openshift-marketplace/community-operators-bbptx' 2026-03-13T01:18:08.045507687Z I0313 01:18:08.045440 1 controller.go:151] Successfully synced 'openshift-cluster-machine-approver/machine-approver-955fcfb87-jvdz8' 2026-03-13T01:18:08.204811004Z I0313 01:18:08.204766 1 controller.go:192] Received pod 'multus-admission-controller-7769569c45-zm2jl' 2026-03-13T01:18:08.204918686Z I0313 01:18:08.204908 1 controller.go:151] Successfully synced 'openshift-multus/multus-admission-controller-7769569c45-zm2jl' 2026-03-13T01:18:08.554135320Z I0313 01:18:08.552907 1 controller.go:192] Received pod 'machine-api-operator-84bf6db4f9-zt229' 2026-03-13T01:18:08.554135320Z I0313 01:18:08.552969 1 controller.go:151] Successfully synced 'openshift-machine-api/machine-api-operator-84bf6db4f9-zt229' 2026-03-13T01:18:11.973343392Z I0313 01:18:11.973285 1 controller.go:192] Received pod 'installer-1-retry-1-master-0' 2026-03-13T01:18:11.973343392Z I0313 01:18:11.973325 1 controller.go:151] Successfully synced 'openshift-kube-apiserver/installer-1-retry-1-master-0' 2026-03-13T01:18:12.026266726Z I0313 01:18:12.026203 1 controller.go:192] Received pod 'machine-config-controller-ff46b7bdf-g7wfh' 2026-03-13T01:18:12.026296447Z I0313 01:18:12.026265 1 controller.go:151] Successfully synced 'openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh' 2026-03-13T01:18:13.607698170Z I0313 01:18:13.607374 1 controller.go:192] Received pod 'prometheus-operator-admission-webhook-8464df8497-kjwgg' 2026-03-13T01:18:13.607698170Z I0313 01:18:13.607433 1 controller.go:151] Successfully synced 'openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg' 2026-03-13T01:18:14.048847438Z I0313 01:18:14.048317 1 controller.go:192] Received pod 'network-check-source-7c67b67d47-5fv6h' 2026-03-13T01:18:14.048847438Z I0313 01:18:14.048371 1 controller.go:151] Successfully synced 'openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h' config/pod/openshift-multus/logs/multus-rvt5h/kube-multus_current.log0000640000000000000000000007732515154662741024733 0ustar00000000000000002026-03-13T01:17:47.898345957Z 2026-03-13T01:17:47Z [verbose] DEL starting CNI request ContainerID:"59133a9d647f486a8926b8884bea8f34510b68fe3f879499fe545b7adae05ea4" Netns:"/var/run/netns/a7b5f009-7e7e-4828-a317-84f710d206b0" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=community-operators-cpp59;K8S_POD_INFRA_CONTAINER_ID=59133a9d647f486a8926b8884bea8f34510b68fe3f879499fe545b7adae05ea4;K8S_POD_UID=c3ae16e5-ba77-427f-b85f-5b354e7bfb9d" Path:"" 2026-03-13T01:17:47.898555593Z 2026-03-13T01:17:47Z [verbose] Del: openshift-marketplace:community-operators-cpp59:c3ae16e5-ba77-427f-b85f-5b354e7bfb9d:ovn-kubernetes:eth0 {"cniVersion":"0.4.0","name":"ovn-kubernetes","type":"ovn-k8s-cni-overlay","ipam":{},"dns":{},"logFile":"/var/log/ovn-kubernetes/ovn-k8s-cni-overlay.log","logLevel":"4","logfile-maxsize":100,"logfile-maxbackups":5,"logfile-maxage":0,"runtimeConfig":{}} 2026-03-13T01:17:48.143699455Z 2026-03-13T01:17:48Z [verbose] DEL finished CNI request ContainerID:"59133a9d647f486a8926b8884bea8f34510b68fe3f879499fe545b7adae05ea4" Netns:"/var/run/netns/a7b5f009-7e7e-4828-a317-84f710d206b0" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=community-operators-cpp59;K8S_POD_INFRA_CONTAINER_ID=59133a9d647f486a8926b8884bea8f34510b68fe3f879499fe545b7adae05ea4;K8S_POD_UID=c3ae16e5-ba77-427f-b85f-5b354e7bfb9d" Path:"", result: "", err: 2026-03-13T01:17:48.284577829Z 2026-03-13T01:17:48Z [verbose] DEL starting CNI request ContainerID:"489575f0a1d8a7c8e97c64f0529347190c5df02ad8ff4559632008aa4dd81545" Netns:"/var/run/netns/a839b90c-ff4e-4faa-94b6-bf06f15543aa" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=redhat-operators-lb5rz;K8S_POD_INFRA_CONTAINER_ID=489575f0a1d8a7c8e97c64f0529347190c5df02ad8ff4559632008aa4dd81545;K8S_POD_UID=6e0572c2-78f9-4c65-8ea0-7242236d641f" Path:"" 2026-03-13T01:17:48.284791045Z 2026-03-13T01:17:48Z [verbose] Del: openshift-marketplace:redhat-operators-lb5rz:6e0572c2-78f9-4c65-8ea0-7242236d641f:ovn-kubernetes:eth0 {"cniVersion":"0.4.0","name":"ovn-kubernetes","type":"ovn-k8s-cni-overlay","ipam":{},"dns":{},"logFile":"/var/log/ovn-kubernetes/ovn-k8s-cni-overlay.log","logLevel":"4","logfile-maxsize":100,"logfile-maxbackups":5,"logfile-maxage":0,"runtimeConfig":{}} 2026-03-13T01:17:48.571812802Z 2026-03-13T01:17:48Z [verbose] DEL finished CNI request ContainerID:"489575f0a1d8a7c8e97c64f0529347190c5df02ad8ff4559632008aa4dd81545" Netns:"/var/run/netns/a839b90c-ff4e-4faa-94b6-bf06f15543aa" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=redhat-operators-lb5rz;K8S_POD_INFRA_CONTAINER_ID=489575f0a1d8a7c8e97c64f0529347190c5df02ad8ff4559632008aa4dd81545;K8S_POD_UID=6e0572c2-78f9-4c65-8ea0-7242236d641f" Path:"", result: "", err: 2026-03-13T01:17:55.787534163Z 2026-03-13T01:17:55Z [verbose] ADD starting CNI request ContainerID:"2a77f8e58ee6b4b9d8e8d1a5c1202e86b111b4dbd37bf30068295cac4daecf86" Netns:"/var/run/netns/4d6e6d48-e93c-4cac-b07d-6fa2c4eb1682" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-3-retry-1-master-0;K8S_POD_INFRA_CONTAINER_ID=2a77f8e58ee6b4b9d8e8d1a5c1202e86b111b4dbd37bf30068295cac4daecf86;K8S_POD_UID=728435e4-9fdb-4fea-9f5b-eb5ff5444da0" Path:"" 2026-03-13T01:17:56.200309769Z I0313 01:17:56.188899 16118 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:17:56.200309769Z I0313 01:17:56.189167 16118 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:17:56.200309769Z I0313 01:17:56.189204 16118 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:17:56.200309769Z I0313 01:17:56.189227 16118 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:17:56.200309769Z I0313 01:17:56.189255 16118 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:17:56.200952536Z 2026-03-13T01:17:56Z [verbose] Add: openshift-kube-controller-manager:installer-3-retry-1-master-0:728435e4-9fdb-4fea-9f5b-eb5ff5444da0:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"2a77f8e58ee6b4b","mac":"5a:da:d9:56:ad:47"},{"name":"eth0","mac":"0a:58:0a:80:00:47","sandbox":"/var/run/netns/4d6e6d48-e93c-4cac-b07d-6fa2c4eb1682"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.71/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:17:56.201757247Z I0313 01:17:56.201694 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-kube-controller-manager", Name:"installer-3-retry-1-master-0", UID:"728435e4-9fdb-4fea-9f5b-eb5ff5444da0", APIVersion:"v1", ResourceVersion:"10265", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.71/23] from ovn-kubernetes 2026-03-13T01:17:56.353968778Z 2026-03-13T01:17:56Z [verbose] ADD finished CNI request ContainerID:"2a77f8e58ee6b4b9d8e8d1a5c1202e86b111b4dbd37bf30068295cac4daecf86" Netns:"/var/run/netns/4d6e6d48-e93c-4cac-b07d-6fa2c4eb1682" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-3-retry-1-master-0;K8S_POD_INFRA_CONTAINER_ID=2a77f8e58ee6b4b9d8e8d1a5c1202e86b111b4dbd37bf30068295cac4daecf86;K8S_POD_UID=728435e4-9fdb-4fea-9f5b-eb5ff5444da0" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"5a:da:d9:56:ad:47\",\"name\":\"2a77f8e58ee6b4b\"},{\"mac\":\"0a:58:0a:80:00:47\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/4d6e6d48-e93c-4cac-b07d-6fa2c4eb1682\"}],\"ips\":[{\"address\":\"10.128.0.71/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: 2026-03-13T01:18:00.011563955Z 2026-03-13T01:18:00Z [verbose] ADD starting CNI request ContainerID:"4a7eca1172ea3bfa17610dd111962352ef959bb3d01e721ed6e19fcbca116334" Netns:"/var/run/netns/a48305ec-ee49-4a4b-bf39-60e2fe8ccf45" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=redhat-operators-k52lh;K8S_POD_INFRA_CONTAINER_ID=4a7eca1172ea3bfa17610dd111962352ef959bb3d01e721ed6e19fcbca116334;K8S_POD_UID=3f9728b4-4e1e-4165-a276-3daa00e95839" Path:"" 2026-03-13T01:18:00.028386745Z 2026-03-13T01:18:00Z [verbose] ADD starting CNI request ContainerID:"cb94d42a599d6d70b76d1a519031e7bc4f9c33d2aa5f5a649a375c7a7bded9ac" Netns:"/var/run/netns/5c33a26e-0acb-430d-a4cf-02f4719b0af8" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=redhat-marketplace-z254g;K8S_POD_INFRA_CONTAINER_ID=cb94d42a599d6d70b76d1a519031e7bc4f9c33d2aa5f5a649a375c7a7bded9ac;K8S_POD_UID=a9c7c6a4-4f5b-4807-932c-1b0f53ceed22" Path:"" 2026-03-13T01:18:00.079396109Z 2026-03-13T01:18:00Z [verbose] ADD starting CNI request ContainerID:"94e09a1dd75367c606e9c0f6209f6e945683271c1483d15ae30d37382e33a6c7" Netns:"/var/run/netns/571631ea-df7b-4b00-a4fc-c14187ed1474" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=community-operators-bbptx;K8S_POD_INFRA_CONTAINER_ID=94e09a1dd75367c606e9c0f6209f6e945683271c1483d15ae30d37382e33a6c7;K8S_POD_UID=a561a1d1-b20f-45fd-9e0c-ee4399a1d31b" Path:"" 2026-03-13T01:18:00.387675592Z I0313 01:18:00.379167 16281 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:18:00.387675592Z I0313 01:18:00.379338 16281 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:18:00.387675592Z I0313 01:18:00.379348 16281 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:18:00.387675592Z I0313 01:18:00.379356 16281 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:18:00.387675592Z I0313 01:18:00.379364 16281 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:18:00.388255828Z 2026-03-13T01:18:00Z [verbose] Add: openshift-marketplace:redhat-operators-k52lh:3f9728b4-4e1e-4165-a276-3daa00e95839:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"4a7eca1172ea3bf","mac":"86:03:03:e5:77:d5"},{"name":"eth0","mac":"0a:58:0a:80:00:48","sandbox":"/var/run/netns/a48305ec-ee49-4a4b-bf39-60e2fe8ccf45"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.72/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:18:00.388916235Z I0313 01:18:00.388723 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-marketplace", Name:"redhat-operators-k52lh", UID:"3f9728b4-4e1e-4165-a276-3daa00e95839", APIVersion:"v1", ResourceVersion:"10318", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.72/23] from ovn-kubernetes 2026-03-13T01:18:00.408874967Z 2026-03-13T01:18:00Z [verbose] ADD finished CNI request ContainerID:"4a7eca1172ea3bfa17610dd111962352ef959bb3d01e721ed6e19fcbca116334" Netns:"/var/run/netns/a48305ec-ee49-4a4b-bf39-60e2fe8ccf45" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=redhat-operators-k52lh;K8S_POD_INFRA_CONTAINER_ID=4a7eca1172ea3bfa17610dd111962352ef959bb3d01e721ed6e19fcbca116334;K8S_POD_UID=3f9728b4-4e1e-4165-a276-3daa00e95839" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"86:03:03:e5:77:d5\",\"name\":\"4a7eca1172ea3bf\"},{\"mac\":\"0a:58:0a:80:00:48\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/a48305ec-ee49-4a4b-bf39-60e2fe8ccf45\"}],\"ips\":[{\"address\":\"10.128.0.72/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: 2026-03-13T01:18:00.464588724Z I0313 01:18:00.457269 16290 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:18:00.464588724Z I0313 01:18:00.457443 16290 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:18:00.464588724Z I0313 01:18:00.457463 16290 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:18:00.464588724Z I0313 01:18:00.457471 16290 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:18:00.464588724Z I0313 01:18:00.457480 16290 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:18:00.465153059Z 2026-03-13T01:18:00Z [verbose] Add: openshift-marketplace:redhat-marketplace-z254g:a9c7c6a4-4f5b-4807-932c-1b0f53ceed22:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"cb94d42a599d6d7","mac":"a2:d4:31:f5:93:bb"},{"name":"eth0","mac":"0a:58:0a:80:00:49","sandbox":"/var/run/netns/5c33a26e-0acb-430d-a4cf-02f4719b0af8"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.73/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:18:00.465485468Z I0313 01:18:00.465398 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-marketplace", Name:"redhat-marketplace-z254g", UID:"a9c7c6a4-4f5b-4807-932c-1b0f53ceed22", APIVersion:"v1", ResourceVersion:"10324", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.73/23] from ovn-kubernetes 2026-03-13T01:18:00.466721300Z I0313 01:18:00.459757 16333 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:18:00.466721300Z I0313 01:18:00.460036 16333 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:18:00.466721300Z I0313 01:18:00.460106 16333 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:18:00.466721300Z I0313 01:18:00.460170 16333 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:18:00.466721300Z I0313 01:18:00.460212 16333 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:18:00.467263374Z 2026-03-13T01:18:00Z [verbose] Add: openshift-marketplace:community-operators-bbptx:a561a1d1-b20f-45fd-9e0c-ee4399a1d31b:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"94e09a1dd75367c","mac":"ba:74:3f:31:05:8e"},{"name":"eth0","mac":"0a:58:0a:80:00:4a","sandbox":"/var/run/netns/571631ea-df7b-4b00-a4fc-c14187ed1474"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.74/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:18:00.467477280Z I0313 01:18:00.467399 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-marketplace", Name:"community-operators-bbptx", UID:"a561a1d1-b20f-45fd-9e0c-ee4399a1d31b", APIVersion:"v1", ResourceVersion:"10319", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.74/23] from ovn-kubernetes 2026-03-13T01:18:00.486690122Z 2026-03-13T01:18:00Z [verbose] ADD finished CNI request ContainerID:"cb94d42a599d6d70b76d1a519031e7bc4f9c33d2aa5f5a649a375c7a7bded9ac" Netns:"/var/run/netns/5c33a26e-0acb-430d-a4cf-02f4719b0af8" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=redhat-marketplace-z254g;K8S_POD_INFRA_CONTAINER_ID=cb94d42a599d6d70b76d1a519031e7bc4f9c33d2aa5f5a649a375c7a7bded9ac;K8S_POD_UID=a9c7c6a4-4f5b-4807-932c-1b0f53ceed22" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"a2:d4:31:f5:93:bb\",\"name\":\"cb94d42a599d6d7\"},{\"mac\":\"0a:58:0a:80:00:49\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/5c33a26e-0acb-430d-a4cf-02f4719b0af8\"}],\"ips\":[{\"address\":\"10.128.0.73/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: 2026-03-13T01:18:00.493737706Z 2026-03-13T01:18:00Z [verbose] ADD finished CNI request ContainerID:"94e09a1dd75367c606e9c0f6209f6e945683271c1483d15ae30d37382e33a6c7" Netns:"/var/run/netns/571631ea-df7b-4b00-a4fc-c14187ed1474" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-marketplace;K8S_POD_NAME=community-operators-bbptx;K8S_POD_INFRA_CONTAINER_ID=94e09a1dd75367c606e9c0f6209f6e945683271c1483d15ae30d37382e33a6c7;K8S_POD_UID=a561a1d1-b20f-45fd-9e0c-ee4399a1d31b" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"ba:74:3f:31:05:8e\",\"name\":\"94e09a1dd75367c\"},{\"mac\":\"0a:58:0a:80:00:4a\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/571631ea-df7b-4b00-a4fc-c14187ed1474\"}],\"ips\":[{\"address\":\"10.128.0.74/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: 2026-03-13T01:18:07.819377962Z 2026-03-13T01:18:07Z [verbose] ADD starting CNI request ContainerID:"3ac90b7e141885c73870d9744a9126cb8648da1eed1822b13844b812ecb6dc82" Netns:"/var/run/netns/b97f49fb-a8cb-4738-86e0-6b468a89c08b" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-multus;K8S_POD_NAME=multus-admission-controller-7769569c45-zm2jl;K8S_POD_INFRA_CONTAINER_ID=3ac90b7e141885c73870d9744a9126cb8648da1eed1822b13844b812ecb6dc82;K8S_POD_UID=2679c6e1-11c1-450c-b03a-30d7ee59ff6f" Path:"" 2026-03-13T01:18:08.194693959Z I0313 01:18:08.177537 16642 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:18:08.194693959Z I0313 01:18:08.177672 16642 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:18:08.194693959Z I0313 01:18:08.177680 16642 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:18:08.194693959Z I0313 01:18:08.177686 16642 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:18:08.194693959Z I0313 01:18:08.177691 16642 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:18:08.194693959Z 2026-03-13T01:18:08Z [verbose] Add: openshift-multus:multus-admission-controller-7769569c45-zm2jl:2679c6e1-11c1-450c-b03a-30d7ee59ff6f:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"3ac90b7e141885c","mac":"7a:22:b5:74:95:52"},{"name":"eth0","mac":"0a:58:0a:80:00:4b","sandbox":"/var/run/netns/b97f49fb-a8cb-4738-86e0-6b468a89c08b"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.75/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:18:08.194693959Z I0313 01:18:08.188143 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-multus", Name:"multus-admission-controller-7769569c45-zm2jl", UID:"2679c6e1-11c1-450c-b03a-30d7ee59ff6f", APIVersion:"v1", ResourceVersion:"10513", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.75/23] from ovn-kubernetes 2026-03-13T01:18:08.194693959Z 2026-03-13T01:18:08Z [verbose] ADD starting CNI request ContainerID:"c50effcf2f5fc891493cebf4edbffd60b3e47884c10225842c0382c940f83e36" Netns:"/var/run/netns/e1caf67d-6f29-4a99-a55f-d26869cc5e44" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=machine-api-operator-84bf6db4f9-zt229;K8S_POD_INFRA_CONTAINER_ID=c50effcf2f5fc891493cebf4edbffd60b3e47884c10225842c0382c940f83e36;K8S_POD_UID=1c24e17c-8bd9-4c23-9876-6f31c9da5cd1" Path:"" 2026-03-13T01:18:08.213526632Z 2026-03-13T01:18:08Z [verbose] ADD finished CNI request ContainerID:"3ac90b7e141885c73870d9744a9126cb8648da1eed1822b13844b812ecb6dc82" Netns:"/var/run/netns/b97f49fb-a8cb-4738-86e0-6b468a89c08b" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-multus;K8S_POD_NAME=multus-admission-controller-7769569c45-zm2jl;K8S_POD_INFRA_CONTAINER_ID=3ac90b7e141885c73870d9744a9126cb8648da1eed1822b13844b812ecb6dc82;K8S_POD_UID=2679c6e1-11c1-450c-b03a-30d7ee59ff6f" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"7a:22:b5:74:95:52\",\"name\":\"3ac90b7e141885c\"},{\"mac\":\"0a:58:0a:80:00:4b\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/b97f49fb-a8cb-4738-86e0-6b468a89c08b\"}],\"ips\":[{\"address\":\"10.128.0.75/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: 2026-03-13T01:18:08.526794755Z I0313 01:18:08.517526 16715 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:18:08.526794755Z I0313 01:18:08.517661 16715 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:18:08.526794755Z I0313 01:18:08.517678 16715 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:18:08.526794755Z I0313 01:18:08.517692 16715 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:18:08.526794755Z I0313 01:18:08.517698 16715 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:18:08.526794755Z 2026-03-13T01:18:08Z [verbose] Add: openshift-machine-api:machine-api-operator-84bf6db4f9-zt229:1c24e17c-8bd9-4c23-9876-6f31c9da5cd1:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"c50effcf2f5fc89","mac":"52:62:52:25:a9:7b"},{"name":"eth0","mac":"0a:58:0a:80:00:4c","sandbox":"/var/run/netns/e1caf67d-6f29-4a99-a55f-d26869cc5e44"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.76/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:18:08.526794755Z I0313 01:18:08.523937 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-machine-api", Name:"machine-api-operator-84bf6db4f9-zt229", UID:"1c24e17c-8bd9-4c23-9876-6f31c9da5cd1", APIVersion:"v1", ResourceVersion:"10557", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.76/23] from ovn-kubernetes 2026-03-13T01:18:08.554240903Z 2026-03-13T01:18:08Z [verbose] ADD finished CNI request ContainerID:"c50effcf2f5fc891493cebf4edbffd60b3e47884c10225842c0382c940f83e36" Netns:"/var/run/netns/e1caf67d-6f29-4a99-a55f-d26869cc5e44" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=machine-api-operator-84bf6db4f9-zt229;K8S_POD_INFRA_CONTAINER_ID=c50effcf2f5fc891493cebf4edbffd60b3e47884c10225842c0382c940f83e36;K8S_POD_UID=1c24e17c-8bd9-4c23-9876-6f31c9da5cd1" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"52:62:52:25:a9:7b\",\"name\":\"c50effcf2f5fc89\"},{\"mac\":\"0a:58:0a:80:00:4c\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/e1caf67d-6f29-4a99-a55f-d26869cc5e44\"}],\"ips\":[{\"address\":\"10.128.0.76/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: 2026-03-13T01:18:11.562199858Z 2026-03-13T01:18:11Z [verbose] ADD starting CNI request ContainerID:"e1a9f8a9b9f4f12cdb02f0899fd6c6ca89ad08ee7dce767d1b7f5c4f67fb87f9" Netns:"/var/run/netns/57dcc7ba-6a6c-4597-8fd2-d2d755455359" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-apiserver;K8S_POD_NAME=installer-1-retry-1-master-0;K8S_POD_INFRA_CONTAINER_ID=e1a9f8a9b9f4f12cdb02f0899fd6c6ca89ad08ee7dce767d1b7f5c4f67fb87f9;K8S_POD_UID=690f916b-6f87-42d9-8168-392a9177bee9" Path:"" 2026-03-13T01:18:11.656815693Z 2026-03-13T01:18:11Z [verbose] ADD starting CNI request ContainerID:"4a82c4d1f4dd0703b5ca166acc233f980e0154f3140fea6bcb51b2baef68cc9c" Netns:"/var/run/netns/24156eb1-cb29-4b05-b628-17c5e9e24cb0" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-config-operator;K8S_POD_NAME=machine-config-controller-ff46b7bdf-g7wfh;K8S_POD_INFRA_CONTAINER_ID=4a82c4d1f4dd0703b5ca166acc233f980e0154f3140fea6bcb51b2baef68cc9c;K8S_POD_UID=93871019-3d0c-4081-9afe-19b6dd108ec6" Path:"" 2026-03-13T01:18:11.958221157Z I0313 01:18:11.952424 16981 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:18:11.958221157Z I0313 01:18:11.952614 16981 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:18:11.958221157Z I0313 01:18:11.952656 16981 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:18:11.958221157Z I0313 01:18:11.952669 16981 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:18:11.958221157Z I0313 01:18:11.952678 16981 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:18:11.958659968Z 2026-03-13T01:18:11Z [verbose] Add: openshift-kube-apiserver:installer-1-retry-1-master-0:690f916b-6f87-42d9-8168-392a9177bee9:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"e1a9f8a9b9f4f12","mac":"c2:d4:47:97:40:e7"},{"name":"eth0","mac":"0a:58:0a:80:00:4d","sandbox":"/var/run/netns/57dcc7ba-6a6c-4597-8fd2-d2d755455359"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.77/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:18:11.958852963Z I0313 01:18:11.958793 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-kube-apiserver", Name:"installer-1-retry-1-master-0", UID:"690f916b-6f87-42d9-8168-392a9177bee9", APIVersion:"v1", ResourceVersion:"10650", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.77/23] from ovn-kubernetes 2026-03-13T01:18:11.973617749Z 2026-03-13T01:18:11Z [verbose] ADD finished CNI request ContainerID:"e1a9f8a9b9f4f12cdb02f0899fd6c6ca89ad08ee7dce767d1b7f5c4f67fb87f9" Netns:"/var/run/netns/57dcc7ba-6a6c-4597-8fd2-d2d755455359" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-apiserver;K8S_POD_NAME=installer-1-retry-1-master-0;K8S_POD_INFRA_CONTAINER_ID=e1a9f8a9b9f4f12cdb02f0899fd6c6ca89ad08ee7dce767d1b7f5c4f67fb87f9;K8S_POD_UID=690f916b-6f87-42d9-8168-392a9177bee9" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"c2:d4:47:97:40:e7\",\"name\":\"e1a9f8a9b9f4f12\"},{\"mac\":\"0a:58:0a:80:00:4d\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/57dcc7ba-6a6c-4597-8fd2-d2d755455359\"}],\"ips\":[{\"address\":\"10.128.0.77/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: 2026-03-13T01:18:12.009317933Z I0313 01:18:12.002713 17035 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:18:12.009317933Z I0313 01:18:12.002958 17035 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:18:12.009317933Z I0313 01:18:12.002999 17035 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:18:12.009317933Z I0313 01:18:12.003047 17035 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:18:12.009317933Z I0313 01:18:12.003075 17035 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:18:12.009646072Z 2026-03-13T01:18:12Z [verbose] Add: openshift-machine-config-operator:machine-config-controller-ff46b7bdf-g7wfh:93871019-3d0c-4081-9afe-19b6dd108ec6:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"4a82c4d1f4dd070","mac":"4a:ba:79:90:39:9e"},{"name":"eth0","mac":"0a:58:0a:80:00:4e","sandbox":"/var/run/netns/24156eb1-cb29-4b05-b628-17c5e9e24cb0"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.78/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:18:12.009920759Z I0313 01:18:12.009860 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-machine-config-operator", Name:"machine-config-controller-ff46b7bdf-g7wfh", UID:"93871019-3d0c-4081-9afe-19b6dd108ec6", APIVersion:"v1", ResourceVersion:"10715", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.78/23] from ovn-kubernetes 2026-03-13T01:18:12.025846355Z 2026-03-13T01:18:12Z [verbose] ADD finished CNI request ContainerID:"4a82c4d1f4dd0703b5ca166acc233f980e0154f3140fea6bcb51b2baef68cc9c" Netns:"/var/run/netns/24156eb1-cb29-4b05-b628-17c5e9e24cb0" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-config-operator;K8S_POD_NAME=machine-config-controller-ff46b7bdf-g7wfh;K8S_POD_INFRA_CONTAINER_ID=4a82c4d1f4dd0703b5ca166acc233f980e0154f3140fea6bcb51b2baef68cc9c;K8S_POD_UID=93871019-3d0c-4081-9afe-19b6dd108ec6" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"4a:ba:79:90:39:9e\",\"name\":\"4a82c4d1f4dd070\"},{\"mac\":\"0a:58:0a:80:00:4e\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/24156eb1-cb29-4b05-b628-17c5e9e24cb0\"}],\"ips\":[{\"address\":\"10.128.0.78/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: 2026-03-13T01:18:12.715706509Z 2026-03-13T01:18:12Z [verbose] ADD starting CNI request ContainerID:"5f0a23a29ec1be227442f950c7b43af141e31a2152ab46cc286a5229950b1bae" Netns:"/var/run/netns/4fb4a7a7-6ea8-487f-899e-78d26113df0f" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-monitoring;K8S_POD_NAME=prometheus-operator-admission-webhook-8464df8497-kjwgg;K8S_POD_INFRA_CONTAINER_ID=5f0a23a29ec1be227442f950c7b43af141e31a2152ab46cc286a5229950b1bae;K8S_POD_UID=4d313ee4-3bb9-44a9-ad80-8e00540ef1e7" Path:"" 2026-03-13T01:18:13.014974426Z 2026-03-13T01:18:13Z [verbose] ADD starting CNI request ContainerID:"19ce38027ae9e3d0076b8c83191fabde1e4e81b393c760835578ba3bc36b41b2" Netns:"/var/run/netns/570765aa-c510-4bfa-b473-c271abc5e3ae" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-network-diagnostics;K8S_POD_NAME=network-check-source-7c67b67d47-5fv6h;K8S_POD_INFRA_CONTAINER_ID=19ce38027ae9e3d0076b8c83191fabde1e4e81b393c760835578ba3bc36b41b2;K8S_POD_UID=48375ae2-d4b4-4db4-b832-3e3db1834fb9" Path:"" 2026-03-13T01:18:13.115432714Z I0313 01:18:13.108204 17191 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:18:13.115432714Z I0313 01:18:13.108393 17191 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:18:13.115432714Z I0313 01:18:13.108409 17191 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:18:13.115432714Z I0313 01:18:13.108422 17191 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:18:13.115432714Z I0313 01:18:13.108435 17191 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:18:13.115797244Z 2026-03-13T01:18:13Z [verbose] Add: openshift-monitoring:prometheus-operator-admission-webhook-8464df8497-kjwgg:4d313ee4-3bb9-44a9-ad80-8e00540ef1e7:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"5f0a23a29ec1be2","mac":"8e:18:cd:2c:16:42"},{"name":"eth0","mac":"0a:58:0a:80:00:4f","sandbox":"/var/run/netns/4fb4a7a7-6ea8-487f-899e-78d26113df0f"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.79/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:18:13.115951138Z I0313 01:18:13.115906 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-monitoring", Name:"prometheus-operator-admission-webhook-8464df8497-kjwgg", UID:"4d313ee4-3bb9-44a9-ad80-8e00540ef1e7", APIVersion:"v1", ResourceVersion:"10763", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.79/23] from ovn-kubernetes 2026-03-13T01:18:13.413801828Z I0313 01:18:13.407687 17234 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false 2026-03-13T01:18:13.413801828Z I0313 01:18:13.407804 17234 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false 2026-03-13T01:18:13.413801828Z I0313 01:18:13.407812 17234 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:18:13.413801828Z I0313 01:18:13.407818 17234 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true 2026-03-13T01:18:13.413801828Z I0313 01:18:13.407826 17234 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:18:13.414293291Z 2026-03-13T01:18:13Z [verbose] Add: openshift-network-diagnostics:network-check-source-7c67b67d47-5fv6h:48375ae2-d4b4-4db4-b832-3e3db1834fb9:ovn-kubernetes(ovn-kubernetes):eth0 {"cniVersion":"0.4.0","interfaces":[{"name":"19ce38027ae9e3d","mac":"8a:e3:01:c7:7f:fc"},{"name":"eth0","mac":"0a:58:0a:80:00:50","sandbox":"/var/run/netns/570765aa-c510-4bfa-b473-c271abc5e3ae"}],"ips":[{"version":"4","interface":1,"address":"10.128.0.80/23","gateway":"10.128.0.1"}],"dns":{}} 2026-03-13T01:18:13.414535457Z I0313 01:18:13.414459 5294 event.go:364] Event(v1.ObjectReference{Kind:"Pod", Namespace:"openshift-network-diagnostics", Name:"network-check-source-7c67b67d47-5fv6h", UID:"48375ae2-d4b4-4db4-b832-3e3db1834fb9", APIVersion:"v1", ResourceVersion:"10765", FieldPath:""}): type: 'Normal' reason: 'AddedInterface' Add eth0 [10.128.0.80/23] from ovn-kubernetes 2026-03-13T01:18:13.605371889Z 2026-03-13T01:18:13Z [verbose] ADD finished CNI request ContainerID:"5f0a23a29ec1be227442f950c7b43af141e31a2152ab46cc286a5229950b1bae" Netns:"/var/run/netns/4fb4a7a7-6ea8-487f-899e-78d26113df0f" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-monitoring;K8S_POD_NAME=prometheus-operator-admission-webhook-8464df8497-kjwgg;K8S_POD_INFRA_CONTAINER_ID=5f0a23a29ec1be227442f950c7b43af141e31a2152ab46cc286a5229950b1bae;K8S_POD_UID=4d313ee4-3bb9-44a9-ad80-8e00540ef1e7" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"8e:18:cd:2c:16:42\",\"name\":\"5f0a23a29ec1be2\"},{\"mac\":\"0a:58:0a:80:00:4f\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/4fb4a7a7-6ea8-487f-899e-78d26113df0f\"}],\"ips\":[{\"address\":\"10.128.0.79/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: 2026-03-13T01:18:14.053708675Z 2026-03-13T01:18:14Z [verbose] ADD finished CNI request ContainerID:"19ce38027ae9e3d0076b8c83191fabde1e4e81b393c760835578ba3bc36b41b2" Netns:"/var/run/netns/570765aa-c510-4bfa-b473-c271abc5e3ae" IfName:"eth0" Args:"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-network-diagnostics;K8S_POD_NAME=network-check-source-7c67b67d47-5fv6h;K8S_POD_INFRA_CONTAINER_ID=19ce38027ae9e3d0076b8c83191fabde1e4e81b393c760835578ba3bc36b41b2;K8S_POD_UID=48375ae2-d4b4-4db4-b832-3e3db1834fb9" Path:"", result: "{\"Result\":{\"cniVersion\":\"1.1.0\",\"interfaces\":[{\"mac\":\"8a:e3:01:c7:7f:fc\",\"name\":\"19ce38027ae9e3d\"},{\"mac\":\"0a:58:0a:80:00:50\",\"name\":\"eth0\",\"sandbox\":\"/var/run/netns/570765aa-c510-4bfa-b473-c271abc5e3ae\"}],\"ips\":[{\"address\":\"10.128.0.80/23\",\"gateway\":\"10.128.0.1\",\"interface\":1}]}}", err: kube-rbac-proxy_current.log0000640000000000000000000000175515154662741032640 0ustar0000000000000000config/pod/openshift-multus/logs/multus-admission-controller-8d675b596-tq7n62026-03-13T01:14:36.073711659Z W0313 01:14:36.073432 1 deprecated.go:66] 2026-03-13T01:14:36.073711659Z ==== Removed Flag Warning ====================== 2026-03-13T01:14:36.073711659Z 2026-03-13T01:14:36.073711659Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-13T01:14:36.073711659Z 2026-03-13T01:14:36.073711659Z =============================================== 2026-03-13T01:14:36.073711659Z 2026-03-13T01:14:36.075428265Z I0313 01:14:36.074386 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-13T01:14:36.075803435Z I0313 01:14:36.075787 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-13T01:14:36.076079653Z I0313 01:14:36.076055 1 kube-rbac-proxy.go:395] Starting TCP socket on :8443 2026-03-13T01:14:36.076316629Z I0313 01:14:36.076301 1 kube-rbac-proxy.go:402] Listening securely on :8443 2026-03-13T01:18:09.080742833Z I0313 01:18:09.079769 1 kube-rbac-proxy.go:493] received interrupt, shutting down multus-admission-controller_current.log0000640000000000000000000000221415154662741035313 0ustar0000000000000000config/pod/openshift-multus/logs/multus-admission-controller-8d675b596-tq7n62026-03-13T01:14:35.263881675Z I0313 01:14:35.263275 1 main.go:57] starting net-attach-def-admission-controller webhook server 2026-03-13T01:14:35.265435966Z W0313 01:14:35.264600 1 client_config.go:618] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. 2026-03-13T01:14:35.268681564Z W0313 01:14:35.265664 1 client_config.go:618] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. 2026-03-13T01:14:35.268681564Z I0313 01:14:35.266446 1 localmetrics.go:51] UPdating net-attach-def metrics for any with value 0 2026-03-13T01:14:35.268681564Z I0313 01:14:35.266473 1 localmetrics.go:51] UPdating net-attach-def metrics for sriov with value 0 2026-03-13T01:14:35.268681564Z I0313 01:14:35.266479 1 localmetrics.go:51] UPdating net-attach-def metrics for ib-sriov with value 0 2026-03-13T01:14:35.268681564Z I0313 01:14:35.266739 1 controller.go:202] Starting net-attach-def-admission-controller 2026-03-13T01:14:35.368660232Z I0313 01:14:35.367225 1 controller.go:211] net-attach-def-admission-controller synced and ready config/pod/openshift-multus/logs/multus-additional-cni-plugins-xn5t5/whereabouts-cni_current.log0000640000000000000000000000010215154662741031777 0ustar00000000000000002026-03-13T01:12:50.401403686Z Done configuring CNI. Sleep=false whereabouts-cni-bincopy_current.log0000640000000000000000000000057415154662741033376 0ustar0000000000000000config/pod/openshift-multus/logs/multus-additional-cni-plugins-xn5t52026-03-13T01:12:49.027939903Z 2026-03-13T01:12:49+00:00 [cnibincopy] Successfully copied files in /usr/src/whereabouts/rhel9/bin/ to /host/opt/cni/bin/upgrade_30dfc48e-b9be-43d9-9429-0f10b4d13a45 2026-03-13T01:12:49.034672862Z 2026-03-13T01:12:49+00:00 [cnibincopy] Successfully moved files in /host/opt/cni/bin/upgrade_30dfc48e-b9be-43d9-9429-0f10b4d13a45 to /host/opt/cni/bin/ config/pod/openshift-multus/logs/multus-additional-cni-plugins-xn5t5/routeoverride-cni_current.log0000640000000000000000000000057715154662741032365 0ustar00000000000000002026-03-13T01:12:32.647230159Z 2026-03-13T01:12:32+00:00 [cnibincopy] Successfully copied files in /usr/src/route-override/rhel9/bin/ to /host/opt/cni/bin/upgrade_cc95c677-799f-46f0-b8be-2d2abfc70d1b 2026-03-13T01:12:32.652219598Z 2026-03-13T01:12:32+00:00 [cnibincopy] Successfully moved files in /host/opt/cni/bin/upgrade_cc95c677-799f-46f0-b8be-2d2abfc70d1b to /host/opt/cni/bin/ config/pod/openshift-multus/logs/multus-additional-cni-plugins-xn5t5/bond-cni-plugin_current.log0000640000000000000000000000055415154662741031700 0ustar00000000000000002026-03-13T01:12:30.036365816Z 2026-03-13T01:12:30+00:00 [cnibincopy] Successfully copied files in /bondcni/rhel9/ to /host/opt/cni/bin/upgrade_b38c7e6a-53d5-47c0-b2cf-7f0d292b3b8a 2026-03-13T01:12:30.041841529Z 2026-03-13T01:12:30+00:00 [cnibincopy] Successfully moved files in /host/opt/cni/bin/upgrade_b38c7e6a-53d5-47c0-b2cf-7f0d292b3b8a to /host/opt/cni/bin/ config/pod/openshift-multus/logs/multus-additional-cni-plugins-xn5t5/cni-plugins_current.log0000640000000000000000000000057015154662741031141 0ustar00000000000000002026-03-13T01:12:26.340679131Z 2026-03-13T01:12:26+00:00 [cnibincopy] Successfully copied files in /usr/src/plugins/rhel9/bin/ to /host/opt/cni/bin/upgrade_8e46c152-8c5b-44c2-940d-196afdb6a4ca 2026-03-13T01:12:26.347686567Z 2026-03-13T01:12:26+00:00 [cnibincopy] Successfully moved files in /host/opt/cni/bin/upgrade_8e46c152-8c5b-44c2-940d-196afdb6a4ca to /host/opt/cni/bin/ egress-router-binary-copy_current.log0000640000000000000000000000060215154662741033666 0ustar0000000000000000config/pod/openshift-multus/logs/multus-additional-cni-plugins-xn5t52026-03-13T01:12:16.650270696Z 2026-03-13T01:12:16+00:00 [cnibincopy] Successfully copied files in /usr/src/egress-router-cni/rhel9/bin/ to /host/opt/cni/bin/upgrade_013aff57-6684-4a4f-965c-80a5b663fca2 2026-03-13T01:12:16.657308553Z 2026-03-13T01:12:16+00:00 [cnibincopy] Successfully moved files in /host/opt/cni/bin/upgrade_013aff57-6684-4a4f-965c-80a5b663fca2 to /host/opt/cni/bin/ kube-scheduler-operator-container_current.log0000640000000000000000000001067415154662741043155 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-wbmqn2026-03-13T01:16:19.571691571Z I0313 01:16:19.562353 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T01:16:19.571691571Z I0313 01:16:19.562580 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T01:16:19.571691571Z I0313 01:16:19.564565 1 observer_polling.go:159] Starting file observer 2026-03-13T01:17:19.577754064Z W0313 01:17:19.574540 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-operator-5c74bfc494-wbmqn) 2026-03-13T01:17:19.577754064Z I0313 01:17:19.574737 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202602132343.p2.gc7b5163.assembly.stream.el9-c7b5163-c7b51633b67e3e2860ca053930422f69e17bd40a 2026-03-13T01:17:40.059274990Z I0313 01:17:40.058236 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T01:17:40.059274990Z W0313 01:17:40.058288 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:17:40.059274990Z W0313 01:17:40.058300 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:17:40.059274990Z W0313 01:17:40.058309 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T01:17:40.059274990Z W0313 01:17:40.058316 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T01:17:40.059274990Z W0313 01:17:40.058322 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T01:17:40.059274990Z W0313 01:17:40.058329 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T01:17:40.066612260Z I0313 01:17:40.066555 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T01:17:40.066684804Z I0313 01:17:40.066673 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T01:17:40.067666262Z I0313 01:17:40.066861 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T01:17:40.067666262Z I0313 01:17:40.067033 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T01:17:40.067666262Z I0313 01:17:40.067478 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:17:40.067666262Z I0313 01:17:40.067505 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:17:40.068351602Z I0313 01:17:40.067817 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T01:17:40.068351602Z I0313 01:17:40.067910 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:17:40.068351602Z I0313 01:17:40.067933 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:17:40.170649079Z I0313 01:17:40.169078 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:17:40.170649079Z I0313 01:17:40.169413 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:17:40.170649079Z I0313 01:17:40.169486 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T01:17:58.122282960Z I0313 01:17:58.122012 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T01:17:58.124562940Z I0313 01:17:58.122472 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... kube-scheduler-operator-container_previous.log0000640000000000000000000004272215154662741043346 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-wbmqn2026-03-13T01:14:37.262686538Z I0313 01:14:37.261693 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"7a85f382-2ce8-42fe-a8dd-9e5759035a34", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/revision-pruner-6-master-0 -n openshift-kube-scheduler because it was missing 2026-03-13T01:14:37.869797111Z I0313 01:14:37.869253 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"7a85f382-2ce8-42fe-a8dd-9e5759035a34", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-6-master-0 -n openshift-kube-scheduler because it was missing 2026-03-13T01:14:38.453000001Z I0313 01:14:38.452719 1 request.go:700] Waited for 1.396761784s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller 2026-03-13T01:14:39.054327899Z I0313 01:14:39.054271 1 installer_controller.go:550] "master-0" is in transition to 6, but has not made progress because installer is not finished, but in Pending phase 2026-03-13T01:14:39.649989985Z I0313 01:14:39.649921 1 request.go:700] Waited for 1.397159736s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/configmaps/config 2026-03-13T01:14:40.849796825Z I0313 01:14:40.849726 1 request.go:700] Waited for 1.397862045s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/openshift-kube-scheduler-sa 2026-03-13T01:14:56.376685271Z I0313 01:14:56.376166 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="571b19eba2edf191a29e78c008ef54b545a7fe031ca7bd3117b93b74798e0c6d") 2026-03-13T01:14:56.376685271Z W0313 01:14:56.376210 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-13T01:14:56.376685271Z I0313 01:14:56.376275 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="6e33a2bc3c3e629ea321506fb9ba033f41356bef095a8b3935982a0bf7e49e1d") 2026-03-13T01:14:56.376685271Z I0313 01:14:56.376448 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-13T01:14:56.376685271Z I0313 01:14:56.376461 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-13T01:14:56.376685271Z I0313 01:14:56.376492 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-13T01:14:56.376685271Z I0313 01:14:56.376542 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T01:14:56.376685271Z I0313 01:14:56.376549 1 base_controller.go:181] Shutting down Installer ... 2026-03-13T01:14:56.376730113Z I0313 01:14:56.376677 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T01:14:56.376738193Z I0313 01:14:56.376725 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-13T01:14:56.377756680Z E0313 01:14:56.377136 1 base_controller.go:279] "Unhandled Error" err="PruneController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/revision-pruner-6-master-0\": context canceled" 2026-03-13T01:14:56.377756680Z I0313 01:14:56.377216 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T01:14:56.377756680Z I0313 01:14:56.377623 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T01:14:56.377858733Z I0313 01:14:56.377811 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T01:14:56.377928275Z I0313 01:14:56.377889 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T01:14:56.377928275Z I0313 01:14:56.377916 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T01:14:56.377945055Z I0313 01:14:56.377931 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T01:14:56.378086769Z W0313 01:14:56.378048 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-13T01:14:56.378086769Z W0313 01:14:56.378072 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-13T01:14:56.378086769Z W0313 01:14:56.378080 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-13T01:14:56.378209502Z E0313 01:14:56.378163 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/openshift-kube-scheduler-sa\": context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T01:14:56.378209502Z I0313 01:14:56.378192 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:14:56.378237653Z I0313 01:14:56.378216 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T01:14:56.378250683Z I0313 01:14:56.378234 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:14:56.378290474Z E0313 01:14:56.378262 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-13T01:14:56.378410348Z I0313 01:14:56.378366 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-13T01:14:56.378410348Z I0313 01:14:56.378395 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T01:14:56.378427758Z I0313 01:14:56.378409 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-13T01:14:56.378427758Z I0313 01:14:56.378423 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T01:14:56.378444319Z I0313 01:14:56.378435 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-13T01:14:56.378457579Z I0313 01:14:56.378428 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-13T01:14:56.378457579Z I0313 01:14:56.378449 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-13T01:14:56.378473609Z I0313 01:14:56.378464 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T01:14:56.378485990Z I0313 01:14:56.378468 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-13T01:14:56.378500920Z I0313 01:14:56.378485 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-13T01:14:56.378500920Z I0313 01:14:56.378493 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-13T01:14:56.378513860Z I0313 01:14:56.378503 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T01:14:56.378526931Z I0313 01:14:56.378509 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-871053691/tls.crt::/tmp/serving-cert-871053691/tls.key" 2026-03-13T01:14:56.378526931Z I0313 01:14:56.378520 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-13T01:14:56.378540461Z I0313 01:14:56.378530 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T01:14:56.378540461Z I0313 01:14:56.378532 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-13T01:14:56.378555282Z I0313 01:14:56.378542 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T01:14:56.378555282Z I0313 01:14:56.378496 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-13T01:14:56.378572022Z I0313 01:14:56.378560 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-13T01:14:56.378572022Z I0313 01:14:56.378555 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T01:14:56.378591243Z I0313 01:14:56.378573 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-13T01:14:56.378591243Z I0313 01:14:56.378575 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-13T01:14:56.378657094Z I0313 01:14:56.378476 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T01:14:56.378657094Z I0313 01:14:56.378513 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T01:14:56.378657094Z I0313 01:14:56.378622 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T01:14:56.378657094Z I0313 01:14:56.378649 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T01:14:56.378657094Z I0313 01:14:56.378617 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378657 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378684 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378586 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378629 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378649 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378702 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378726 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378698 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378757 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378711 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T01:14:56.378774467Z I0313 01:14:56.378741 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-13T01:14:56.378806018Z I0313 01:14:56.378599 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-13T01:14:56.378806018Z I0313 01:14:56.378785 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-13T01:14:56.378822699Z I0313 01:14:56.378802 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"7a85f382-2ce8-42fe-a8dd-9e5759035a34", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 6 count 0 on node "master-0": Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-6-master-0": context canceled 2026-03-13T01:14:56.378888861Z I0313 01:14:56.378851 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T01:14:56.378888861Z I0313 01:14:56.378882 1 builder.go:335] server exited 2026-03-13T01:14:56.378959052Z E0313 01:14:56.378931 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-13T01:14:56.378959052Z I0313 01:14:56.378947 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T01:14:56.378976413Z I0313 01:14:56.378958 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T01:14:56.378976413Z I0313 01:14:56.378966 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T01:14:56.379252980Z I0313 01:14:56.379207 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-13T01:14:56.379252980Z I0313 01:14:56.379225 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-13T01:14:56.379361353Z I0313 01:14:56.379334 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T01:14:56.379361353Z I0313 01:14:56.379347 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T01:14:56.379361353Z I0313 01:14:56.379355 1 controller_manager.go:54] Installer controller terminated 2026-03-13T01:14:56.379920388Z E0313 01:14:56.379862 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-13T01:14:56.380134614Z I0313 01:14:56.380087 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-13T01:14:56.380134614Z I0313 01:14:56.380123 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-13T01:14:56.380179315Z I0313 01:14:56.380152 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-13T01:14:56.380937006Z E0313 01:14:56.380624 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T01:14:56.380964056Z E0313 01:14:56.380830 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T01:14:56.380979697Z I0313 01:14:56.380966 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-13T01:14:56.380995217Z I0313 01:14:56.380982 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-13T01:14:56.381010618Z I0313 01:14:56.380993 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-13T01:14:56.382218740Z I0313 01:14:56.382171 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T01:14:56.382218740Z I0313 01:14:56.382198 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T01:14:56.382218740Z I0313 01:14:56.382209 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T01:14:56.382300942Z I0313 01:14:56.382258 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T01:14:56.382318833Z I0313 01:14:56.382301 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T01:15:01.375923588Z I0313 01:15:01.375865 1 observer_polling.go:162] Shutting down file observer 2026-03-13T01:15:30.382032946Z E0313 01:15:30.381905 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-13T01:15:30.382032946Z W0313 01:15:30.381953 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-wbmqn.json0000640000000000000000000001365215154662741032202 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-5c74bfc494-wbmqn","generateName":"openshift-kube-scheduler-operator-5c74bfc494-","namespace":"openshift-kube-scheduler-operator","uid":"22587300-2448-4862-9fd8-68197d17a9f2","resourceVersion":"9840","creationTimestamp":"2026-03-13T01:11:36Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"5c74bfc494"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.6/23\"],\"mac_address\":\"0a:58:0a:80:00:06\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.6/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.6\"\n ],\n \"mac\": \"0a:58:0a:80:00:06\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-5c74bfc494","uid":"5250ba84-7fc5-4a5a-ac0b-77673030b0ba","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:26Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:26Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.6","podIPs":[{"ip":"10.128.0.6"}],"startTime":"2026-03-13T01:13:10Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-13T01:16:19Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T01:13:25Z","finishedAt":"2026-03-13T01:15:30Z","containerID":"cri-o://0e6fdad2e1926f784b1c498cd01186eeb32850cc4a0f69925bc0668ef060c2a8"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://291d7f234c91da53973dfeea878525a20e6b8e9491a00bb5aa5e9bac339b437f","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/revision-pruner-6-master-0/pruner_current.log0000640000000000000000000000351115154662741027665 0ustar00000000000000002026-03-13T01:14:38.736679258Z I0313 01:14:38.736189 1 cmd.go:39] &{ true {false} prune true map[cert-dir:0xc000a89cc0 max-eligible-revision:0xc0006fdd60 protected-revisions:0xc0006fde00 resource-dir:0xc0006fdea0 static-pod-name:0xc000a67ea0 v:0xc0004b6f00] [0xc0004b6f00 0xc0006fdd60 0xc0006fde00 0xc0006fdea0 0xc000a89cc0 0xc000a67ea0] [] map[cert-dir:0xc000a89cc0 help:0xc0004b7680 log-flush-frequency:0xc0004b6dc0 max-eligible-revision:0xc0006fdd60 protected-revisions:0xc0006fde00 resource-dir:0xc0006fdea0 static-pod-name:0xc000a67ea0 v:0xc0004b6f00 vmodule:0xc0004b7040] [0xc0006fdd60 0xc0006fde00 0xc0006fdea0 0xc000a67ea0 0xc000a89cc0 0xc0004b6dc0 0xc0004b6f00 0xc0004b7040 0xc0004b7680] [0xc000a89cc0 0xc0004b7680 0xc0004b6dc0 0xc0006fdd60 0xc0006fde00 0xc0006fdea0 0xc000a67ea0 0xc0004b6f00 0xc0004b7040] map[104:0xc0004b7680 118:0xc0004b6f00] [] -1 0 0xc000c1b290 true 0x223d9a0 []} 2026-03-13T01:14:38.736679258Z I0313 01:14:38.736336 1 cmd.go:40] (*prune.PruneOptions)(0xc0002bd360)({ 2026-03-13T01:14:38.736679258Z MaxEligibleRevision: (int) 6, 2026-03-13T01:14:38.736679258Z ProtectedRevisions: ([]int) (len=5 cap=5) { 2026-03-13T01:14:38.736679258Z (int) 2, 2026-03-13T01:14:38.736679258Z (int) 3, 2026-03-13T01:14:38.736679258Z (int) 4, 2026-03-13T01:14:38.736679258Z (int) 5, 2026-03-13T01:14:38.736679258Z (int) 6 2026-03-13T01:14:38.736679258Z }, 2026-03-13T01:14:38.736679258Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T01:14:38.736679258Z CertDir: (string) (len=20) "kube-scheduler-certs", 2026-03-13T01:14:38.736679258Z StaticPodName: (string) (len=18) "kube-scheduler-pod" 2026-03-13T01:14:38.736679258Z }) 2026-03-13T01:14:38.736679258Z I0313 01:14:38.736399 1 cmd.go:130] Skipping /etc/kubernetes/static-pod-resources/kube-scheduler-certs as it does not exist config/pod/openshift-kube-scheduler/logs/installer-6-master-0/installer_current.log0000640000000000000000000001447315154662741027206 0ustar00000000000000002026-03-13T01:14:40.830867616Z I0313 01:14:40.741161 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc0009e0f00 cert-secrets:0xc0009e0c80 configmaps:0xc0009e0820 namespace:0xc0009e0640 optional-configmaps:0xc0009e0960 optional-secrets:0xc0009e08c0 pod:0xc0009e06e0 pod-manifest-dir:0xc0009e0aa0 resource-dir:0xc0009e0a00 revision:0xc0009e05a0 secrets:0xc0009e0780 v:0xc000a820a0] [0xc000a820a0 0xc0009e05a0 0xc0009e0640 0xc0009e06e0 0xc0009e0a00 0xc0009e0aa0 0xc0009e0820 0xc0009e0960 0xc0009e08c0 0xc0009e0780 0xc0009e0f00 0xc0009e0c80] [] map[cert-configmaps:0xc0009e0d20 cert-dir:0xc0009e0f00 cert-secrets:0xc0009e0c80 configmaps:0xc0009e0820 help:0xc000a82460 kubeconfig:0xc0009e0500 log-flush-frequency:0xc000a82000 namespace:0xc0009e0640 optional-cert-configmaps:0xc0009e0e60 optional-cert-secrets:0xc0009e0dc0 optional-configmaps:0xc0009e0960 optional-secrets:0xc0009e08c0 pod:0xc0009e06e0 pod-manifest-dir:0xc0009e0aa0 pod-manifests-lock-file:0xc0009e0be0 resource-dir:0xc0009e0a00 revision:0xc0009e05a0 secrets:0xc0009e0780 timeout-duration:0xc0009e0b40 v:0xc000a820a0 vmodule:0xc000a82140] [0xc0009e0500 0xc0009e05a0 0xc0009e0640 0xc0009e06e0 0xc0009e0780 0xc0009e0820 0xc0009e08c0 0xc0009e0960 0xc0009e0a00 0xc0009e0aa0 0xc0009e0b40 0xc0009e0be0 0xc0009e0c80 0xc0009e0d20 0xc0009e0dc0 0xc0009e0e60 0xc0009e0f00 0xc000a82000 0xc000a820a0 0xc000a82140 0xc000a82460] [0xc0009e0d20 0xc0009e0f00 0xc0009e0c80 0xc0009e0820 0xc000a82460 0xc0009e0500 0xc000a82000 0xc0009e0640 0xc0009e0e60 0xc0009e0dc0 0xc0009e0960 0xc0009e08c0 0xc0009e06e0 0xc0009e0aa0 0xc0009e0be0 0xc0009e0a00 0xc0009e05a0 0xc0009e0780 0xc0009e0b40 0xc000a820a0 0xc000a82140] map[104:0xc000a82460 118:0xc000a820a0] [] -1 0 0xc00097ede0 true 0x223d9a0 []} 2026-03-13T01:14:40.831135043Z I0313 01:14:40.831110 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000701d40)({ 2026-03-13T01:14:40.831135043Z KubeConfig: (string) "", 2026-03-13T01:14:40.831135043Z KubeClient: (kubernetes.Interface) , 2026-03-13T01:14:40.831135043Z Revision: (string) (len=1) "6", 2026-03-13T01:14:40.831135043Z NodeName: (string) "", 2026-03-13T01:14:40.831135043Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-13T01:14:40.831135043Z Clock: (clock.RealClock) { 2026-03-13T01:14:40.831135043Z }, 2026-03-13T01:14:40.831135043Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-13T01:14:40.831135043Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:14:40.831135043Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T01:14:40.831135043Z }, 2026-03-13T01:14:40.831135043Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:14:40.831135043Z (string) (len=12) "serving-cert" 2026-03-13T01:14:40.831135043Z }, 2026-03-13T01:14:40.831135043Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-13T01:14:40.831135043Z (string) (len=18) "kube-scheduler-pod", 2026-03-13T01:14:40.831135043Z (string) (len=6) "config", 2026-03-13T01:14:40.831135043Z (string) (len=17) "serviceaccount-ca", 2026-03-13T01:14:40.831135043Z (string) (len=20) "scheduler-kubeconfig", 2026-03-13T01:14:40.831135043Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-13T01:14:40.831135043Z }, 2026-03-13T01:14:40.831135043Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:14:40.831135043Z (string) (len=16) "policy-configmap" 2026-03-13T01:14:40.831135043Z }, 2026-03-13T01:14:40.831135043Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-13T01:14:40.831135043Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-13T01:14:40.831135043Z }, 2026-03-13T01:14:40.831135043Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-13T01:14:40.831135043Z CertConfigMapNamePrefixes: ([]string) , 2026-03-13T01:14:40.831135043Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-13T01:14:40.831135043Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-13T01:14:40.831135043Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T01:14:40.831135043Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T01:14:40.831135043Z Timeout: (time.Duration) 2m0s, 2026-03-13T01:14:40.831135043Z StaticPodManifestsLockFile: (string) "", 2026-03-13T01:14:40.831135043Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T01:14:40.831135043Z KubeletVersion: (string) "" 2026-03-13T01:14:40.831135043Z }) 2026-03-13T01:14:40.832470919Z I0313 01:14:40.832426 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T01:15:37.167986141Z W0313 01:15:37.167852 1 cmd.go:423] unable to get owner reference (falling back to namespace): Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-6-master-0?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:15:37.167986141Z I0313 01:15:37.167934 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T01:15:37.168045433Z I0313 01:15:37.167993 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:15:37.168045433Z I0313 01:15:37.168011 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:15:51.169471466Z W0313 01:15:51.169388 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:16:15.174876754Z W0313 01:16:15.174782 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:16:35.173839130Z W0313 01:16:35.173734 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:16:40.832610364Z F0313 01:16:40.832497 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-scheduler/installer-6-master-0.json0000640000000000000000000001644215154662741022671 0ustar0000000000000000{"metadata":{"name":"installer-6-master-0","namespace":"openshift-kube-scheduler","uid":"0b3a64f4-e94f-4916-8c91-a255d987735d","resourceVersion":"9868","creationTimestamp":"2026-03-13T01:14:37Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.65/23\"],\"mac_address\":\"0a:58:0a:80:00:41\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.65/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.65\"\n ],\n \"mac\": \"0a:58:0a:80:00:41\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-6","uid":"f4a9bde1-84cb-4b62-8a2a-bbb74fdbfbea"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=6","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-wvk2x"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:37Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.65","podIPs":[{"ip":"10.128.0.65"}],"startTime":"2026-03-13T01:14:37Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 01:14:40.832426 1 cmd.go:413] Getting controller reference for node master-0\nW0313 01:15:37.167852 1 cmd.go:423] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-6-master-0?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0313 01:15:37.167934 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 01:15:37.167993 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 01:15:37.168011 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nW0313 01:15:51.169388 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0313 01:16:15.174782 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0313 01:16:35.173734 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0313 01:16:40.832497 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-13T01:14:40Z","finishedAt":"2026-03-13T01:16:40Z","containerID":"cri-o://6b91817f5b3f7a0651a092d44f47916346942c3944860ca84cb9f688537c7ce3"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://6b91817f5b3f7a0651a092d44f47916346942c3944860ca84cb9f688537c7ce3","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004300315154662741030230 0ustar00000000000000002026-03-13T01:15:57.509493585Z - name: NodePorts 2026-03-13T01:15:57.509493585Z weight: 0 2026-03-13T01:15:57.509493585Z - name: NodeResourcesFit 2026-03-13T01:15:57.509493585Z weight: 1 2026-03-13T01:15:57.509493585Z - name: VolumeRestrictions 2026-03-13T01:15:57.509493585Z weight: 0 2026-03-13T01:15:57.509493585Z - name: NodeVolumeLimits 2026-03-13T01:15:57.509493585Z weight: 0 2026-03-13T01:15:57.509493585Z - name: VolumeBinding 2026-03-13T01:15:57.509493585Z weight: 0 2026-03-13T01:15:57.509493585Z - name: VolumeZone 2026-03-13T01:15:57.509493585Z weight: 0 2026-03-13T01:15:57.509493585Z - name: PodTopologySpread 2026-03-13T01:15:57.509493585Z weight: 2 2026-03-13T01:15:57.509493585Z - name: InterPodAffinity 2026-03-13T01:15:57.509493585Z weight: 2 2026-03-13T01:15:57.509493585Z - name: DefaultPreemption 2026-03-13T01:15:57.509493585Z weight: 0 2026-03-13T01:15:57.509493585Z - name: NodeResourcesBalancedAllocation 2026-03-13T01:15:57.509493585Z weight: 1 2026-03-13T01:15:57.509493585Z - name: ImageLocality 2026-03-13T01:15:57.509493585Z weight: 1 2026-03-13T01:15:57.509493585Z - name: DefaultBinder 2026-03-13T01:15:57.509493585Z weight: 0 2026-03-13T01:15:57.509493585Z permit: {} 2026-03-13T01:15:57.509493585Z postBind: {} 2026-03-13T01:15:57.509493585Z postFilter: {} 2026-03-13T01:15:57.509493585Z preBind: {} 2026-03-13T01:15:57.509493585Z preEnqueue: {} 2026-03-13T01:15:57.509493585Z preFilter: {} 2026-03-13T01:15:57.509493585Z preScore: {} 2026-03-13T01:15:57.509493585Z queueSort: {} 2026-03-13T01:15:57.509493585Z reserve: {} 2026-03-13T01:15:57.509493585Z score: {} 2026-03-13T01:15:57.509493585Z schedulerName: default-scheduler 2026-03-13T01:15:57.509493585Z > 2026-03-13T01:15:57.512567128Z I0313 01:15:57.512476 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-13T01:15:57.512567128Z I0313 01:15:57.512512 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-13T01:15:57.516468114Z I0313 01:15:57.516394 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:15:57.516500075Z I0313 01:15:57.516483 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:15:57.517284816Z I0313 01:15:57.516924 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-13T01:15:57.517284816Z I0313 01:15:57.517018 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773364497\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773364496\" (2026-03-13 00:14:56 +0000 UTC to 2027-03-13 00:14:56 +0000 UTC (now=2026-03-13 01:15:57.516939757 +0000 UTC))" 2026-03-13T01:15:57.517320647Z I0313 01:15:57.517266 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773364497\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773364497\" (2026-03-13 00:14:57 +0000 UTC to 2029-03-13 00:14:57 +0000 UTC (now=2026-03-13 01:15:57.517238945 +0000 UTC))" 2026-03-13T01:15:57.517388159Z I0313 01:15:57.517338 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-13T01:15:57.517497852Z I0313 01:15:57.517454 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T01:15:57.520139903Z I0313 01:15:57.520072 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-13T01:15:57.524422439Z I0313 01:15:57.524360 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.524984384Z I0313 01:15:57.524909 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.525329694Z I0313 01:15:57.525249 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.525523229Z I0313 01:15:57.525457 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.525724034Z I0313 01:15:57.525685 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.526707081Z I0313 01:15:57.526586 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.526867385Z I0313 01:15:57.526813 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.527056180Z I0313 01:15:57.526619 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.528678464Z I0313 01:15:57.527735 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.528678464Z I0313 01:15:57.527763 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.528678464Z I0313 01:15:57.528441 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.528678464Z I0313 01:15:57.528579 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-13T01:15:57.539900558Z I0313 01:15:57.539830 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.540298379Z I0313 01:15:57.540253 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.554929055Z I0313 01:15:57.553334 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.565750847Z I0313 01:15:57.561615 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-13T01:15:57.617362914Z I0313 01:15:57.617288 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:15:57.617981541Z I0313 01:15:57.617931 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-13T01:15:57.618117944Z I0313 01:15:57.618036 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 00:56:08 +0000 UTC to 2036-03-10 00:56:08 +0000 UTC (now=2026-03-13 01:15:57.618000731 +0000 UTC))" 2026-03-13T01:15:57.618137515Z I0313 01:15:57.618111 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 01:03:12 +0000 UTC to 2026-03-14 01:03:12 +0000 UTC (now=2026-03-13 01:15:57.618099184 +0000 UTC))" 2026-03-13T01:15:57.618180296Z I0313 01:15:57.618148 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 01:03:13 +0000 UTC to 2027-03-13 01:03:13 +0000 UTC (now=2026-03-13 01:15:57.618135195 +0000 UTC))" 2026-03-13T01:15:57.618196407Z I0313 01:15:57.618175 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 01:03:13 +0000 UTC to 2027-03-13 01:03:13 +0000 UTC (now=2026-03-13 01:15:57.618165396 +0000 UTC))" 2026-03-13T01:15:57.618236548Z I0313 01:15:57.618200 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 01:03:10 +0000 UTC to 2036-03-10 01:03:10 +0000 UTC (now=2026-03-13 01:15:57.618191636 +0000 UTC))" 2026-03-13T01:15:57.618504845Z I0313 01:15:57.618447 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773364497\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773364496\" (2026-03-13 00:14:56 +0000 UTC to 2027-03-13 00:14:56 +0000 UTC (now=2026-03-13 01:15:57.618431723 +0000 UTC))" 2026-03-13T01:15:57.618789093Z I0313 01:15:57.618735 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773364497\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773364497\" (2026-03-13 00:14:57 +0000 UTC to 2029-03-13 00:14:57 +0000 UTC (now=2026-03-13 01:15:57.61870166 +0000 UTC))" 2026-03-13T01:16:02.618587506Z E0313 01:16:02.618454 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:16:11.908067275Z E0313 01:16:11.907973 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:16:19.932388501Z E0313 01:16:19.932287 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:16:29.324530789Z E0313 01:16:29.324405 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:16:38.049587707Z E0313 01:16:38.049488 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:16:46.666422416Z E0313 01:16:46.666297 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:16:54.843884864Z E0313 01:16:54.843773 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:03.034617753Z E0313 01:17:03.034538 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-13T01:17:12.095096346Z E0313 01:17:12.094940 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:21.398887494Z E0313 01:17:21.398752 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:29.181951191Z E0313 01:17:29.181828 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:37.276871519Z E0313 01:17:37.276777 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:59.527720599Z I0313 01:17:59.527601 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-13T01:17:59.528585492Z I0313 01:17:59.528446 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-cnrhm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:17:59.529022694Z I0313 01:17:59.528926 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:17:59.529956118Z I0313 01:17:59.529855 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:17:59.540469683Z I0313 01:17:59.540372 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-z254g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:17:59.547318962Z I0313 01:17:59.546574 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-k52lh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:17:59.547318962Z I0313 01:17:59.546991 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-bbptx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:06.891452132Z I0313 01:18:06.888259 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-pmkpj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:06.891452132Z I0313 01:18:06.888516 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-lnm8m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:06.977402730Z I0313 01:18:06.977335 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-7769569c45-zm2jl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:07.755789999Z I0313 01:18:07.755716 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-84bf6db4f9-zt229" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:08.080307557Z I0313 01:18:08.079377 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-754bdc9f9d-knlw8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:11.289182977Z I0313 01:18:11.289077 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-ff46b7bdf-g7wfh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:12.270974977Z I0313 01:18:12.269340 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:12.270974977Z I0313 01:18:12.269827 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:12.272525868Z I0313 01:18:12.272467 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-79f8cd6fdd-cnrhm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:18:12.289517232Z I0313 01:18:12.289419 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/cni-sysctl-allowlist-ds-hdx2d" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006431315154662741030431 0ustar00000000000000002026-03-13T01:11:38.258827844Z I0313 01:11:38.256728 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-mvmt2" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:11:38.359037639Z I0313 01:11:38.358702 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-bxqp2" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:11:38.462812404Z I0313 01:11:38.462687 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-64488f9d78-bqmmf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:11:38.561467125Z I0313 01:11:38.561323 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-ck7rt" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:11:38.660892528Z I0313 01:11:38.660777 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f-c2xl8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:11:38.756787781Z I0313 01:11:38.756393 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-h4kkj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:11:38.860109333Z I0313 01:11:38.858754 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-589895fbb7-qvl2k" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:11:38.953380133Z I0313 01:11:38.953245 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-mlslx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:11:39.562790099Z I0313 01:11:39.562706 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-h46pz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:11:39.570692830Z I0313 01:11:39.570561 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-qpxft" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:11:58.818544998Z I0313 01:11:58.818444 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-9psj4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:12:08.718868269Z I0313 01:12:08.718748 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-rvt5h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:12:08.909600547Z I0313 01:12:08.909365 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-xn5t5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:12:09.701232143Z I0313 01:12:09.701122 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-zh5fh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:12:11.697601128Z I0313 01:12:11.697533 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-8d675b596-tq7n6" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:12:21.125732326Z I0313 01:12:21.124061 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-66b55d57d-cjmvd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:12:21.311151895Z I0313 01:12:21.311065 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-5h8l9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:12:23.287228511Z I0313 01:12:23.287152 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-5fv6h" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:12:24.289066361Z I0313 01:12:24.288987 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-xs8pt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:12:26.892511956Z I0313 01:12:26.892421 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-znqwc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:12:50.170235695Z I0313 01:12:50.169800 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-v56ct" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.305417034Z I0313 01:13:10.304066 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598-47sjr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.307276316Z I0313 01:13:10.306728 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-677db989d6-kdn2l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.307276316Z I0313 01:13:10.306903 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-jjdk8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.307276316Z I0313 01:13:10.307006 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-64bf9778cb-dszg5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.307276316Z I0313 01:13:10.307096 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-sslxh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.307350308Z I0313 01:13:10.307302 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-wbmqn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.318731146Z I0313 01:13:10.315706 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-fdb5c78b5-6slg8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.323686 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-h46pz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.323831 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-2v42g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.323895 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-mlslx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.324041 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-589895fbb7-qvl2k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.324099 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-8d675b596-tq7n6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.324188 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-v9nfg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.324313 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-h4kkj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.324369 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-2tr2t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.324424 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-mvmt2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.324539 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-ck7rt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.324595 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-nrzpj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.324677 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-7nstm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.325269 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-bxqp2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.325332 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-64488f9d78-bqmmf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.326396151Z I0313 01:13:10.325420 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-8l7kq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.339127547Z I0313 01:13:10.338267 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f-c2xl8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.339127547Z I0313 01:13:10.338417 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-v9pv6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.339127547Z I0313 01:13:10.338524 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-4m9c9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:10.432332706Z I0313 01:13:10.431042 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-qclwv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:28.062360587Z I0313 01:13:28.062268 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6f7fd6c796-d7hx2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:28.166140822Z I0313 01:13:28.166015 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-58959cd4d6-j9tlk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:29.892441987Z I0313 01:13:29.892376 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-bdb5d4bf8-p9mzb" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:13:29.909721441Z I0313 01:13:29.907848 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-77c7f858c6-8khnv" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:13:31.093747370Z I0313 01:13:31.093607 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-bdb5d4bf8-p9mzb" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:13:31.108756970Z I0313 01:13:31.108306 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-77c7f858c6-8khnv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:31.655064410Z I0313 01:13:31.651218 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-85b4d45f77-rw9cf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:34.882742335Z I0313 01:13:34.880296 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-57ccdf9b5-kxxzc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:37.984691812Z I0313 01:13:37.984431 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-74b98ff8f9-m4bbb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:39.678727835Z I0313 01:13:39.678662 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-84bfdbbb7f-qr9tk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:45.702092478Z I0313 01:13:45.701740 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-65c58d4d64-6dpp5" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:13:45.814271357Z I0313 01:13:45.813784 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-2slj5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:47.271564605Z I0313 01:13:47.271269 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-748d7f7c46-r6nmm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:13:47.376236544Z I0313 01:13:47.374480 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-65c58d4d64-6dpp5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:48.650246501Z I0313 01:13:48.650175 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-748d7f7c46-r6nmm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:13:49.002712855Z I0313 01:13:48.995352 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-69c74d8d69-jpj8z" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:13:50.675727841Z I0313 01:13:50.674150 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-748d7f7c46-r6nmm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:54.709908290Z I0313 01:13:54.708135 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-7fc8j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:54.807407009Z I0313 01:13:54.804681 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-2wh5w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:13:59.673782349Z I0313 01:13:59.666815 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-78885b775b-jrrjv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:00.819331191Z I0313 01:14:00.816950 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-9vzj5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:01.334055687Z I0313 01:14:01.333610 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-26mfw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:01.685767890Z I0313 01:14:01.685709 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-lw6xm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:01.941736965Z I0313 01:14:01.939856 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-cnrhm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:14:02.753077582Z I0313 01:14:02.750884 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-69c74d8d69-jpj8z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:06.905195891Z I0313 01:14:06.904955 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6cc877748f-cvjwm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:14:07.002869585Z I0313 01:14:07.001291 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-d4d56c4b7-ndd42" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:14:08.834342974Z I0313 01:14:08.834130 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-d4d56c4b7-ndd42" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:14:08.842512643Z I0313 01:14:08.842466 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6cc877748f-cvjwm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:11.692182060Z I0313 01:14:11.691842 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-d4d56c4b7-ndd42" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:16.212901142Z I0313 01:14:16.212848 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-8c9c967c7-4d6fw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:26.871669171Z I0313 01:14:26.871504 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-757fb68448-cj9p5" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:14:26.915268673Z I0313 01:14:26.906852 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-5dc55b5d9c-nlg6m" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:14:31.274765648Z I0313 01:14:31.274667 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6686554ddc-w6qs7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:31.276744181Z I0313 01:14:31.275498 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-757fb68448-cj9p5" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-13T01:14:31.284480869Z I0313 01:14:31.284355 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-5dc55b5d9c-nlg6m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:33.381774670Z I0313 01:14:33.381663 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-757fb68448-cj9p5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:34.165017320Z I0313 01:14:34.164758 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-955fcfb87-jvdz8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:35.392739599Z I0313 01:14:35.392579 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47-qslvf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:36.474249279Z I0313 01:14:36.473954 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kjwgg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-13T01:14:36.628986609Z I0313 01:14:36.628686 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-29mns" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:36.734408854Z I0313 01:14:36.734344 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85-2xfpz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:36.803549803Z I0313 01:14:36.802511 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-lb5rz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:38.093650020Z I0313 01:14:38.091414 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-68f6795949-v9w8g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:38.202701452Z I0313 01:14:38.201618 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-8f89dfddd-6k2t7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:38.225881565Z I0313 01:14:38.225831 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-9zvz2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:38.436835477Z I0313 01:14:38.436020 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-69576476f7-2q4qb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:39.207922299Z I0313 01:14:39.207873 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-cpp59" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-13T01:14:46.028293291Z E0313 01:14:46.028212 1 leaderelection.go:429] Failed to update lock optimitically: the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io kube-scheduler), falling back to slow path 2026-03-13T01:14:51.027697742Z E0313 01:14:51.027577 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-13T01:14:51.027697742Z I0313 01:14:51.027617 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-13T01:14:56.031074719Z E0313 01:14:56.031017 1 leaderelection.go:322] Failed to release lock: the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io kube-scheduler) 2026-03-13T01:14:56.031101649Z E0313 01:14:56.031074 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515154662741023017 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"8dcb48dd-c1e7-430b-a159-d3de9283aeff","resourceVersion":"9856","creationTimestamp":"2026-03-13T01:12:35Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.mirror":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.seen":"2026-03-13T01:11:02.521511435Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c49bf4d8-4e43-40fb-93c2-f084fdfa1bba","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:57Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:57Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T01:13:19Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-13T01:14:56Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-13T01:11:11Z","finishedAt":"2026-03-13T01:14:56Z","containerID":"cri-o://d17962d23b6425584e2488789adc4521ea90d5d79405cef63024d09b7df17fd9"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://d71b1cc6761a45082d16174057a8ba98300f0e56574d0c45301dacf3ba713ba9","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000011710015154662741034223 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-13T01:11:26.614714336Z I0313 01:11:26.614616 1 reconciliation_controller.go:149] Caches are synced 2026-03-13T01:11:26.669041056Z I0313 01:11:26.668918 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-13T01:11:28.018416493Z W0313 01:11:28.018239 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T01:11:28.018416493Z E0313 01:11:28.018331 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T01:11:37.045929127Z W0313 01:11:37.045770 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T01:11:37.045929127Z E0313 01:11:37.045840 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T01:11:52.915888675Z W0313 01:11:52.915736 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T01:11:52.915888675Z E0313 01:11:52.915798 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T01:12:05.962915646Z I0313 01:12:05.962781 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-03-13T01:12:06.867946806Z I0313 01:12:06.867858 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-13T01:12:07.072095070Z I0313 01:12:07.071959 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-13T01:12:12.683554344Z I0313 01:12:12.683441 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-03-13T01:12:19.074612568Z W0313 01:12:19.074523 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T01:12:19.074612568Z E0313 01:12:19.074579 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T01:12:19.568248534Z E0313 01:12:19.568162 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: a99fe3f7-a159-4399-a55a-d9610e5a742a, UID in object meta: , falling back to slow path 2026-03-13T01:12:20.683411276Z I0313 01:12:20.683332 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-03-13T01:12:21.879901822Z I0313 01:12:21.879840 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-03-13T01:12:25.088854986Z I0313 01:12:25.088803 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-03-13T01:12:25.464983522Z I0313 01:12:25.464940 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-03-13T01:12:25.868845075Z I0313 01:12:25.868801 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-03-13T01:12:26.685926514Z I0313 01:12:26.685885 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-03-13T01:12:26.686071728Z I0313 01:12:26.686056 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-03-13T01:12:26.686131000Z I0313 01:12:26.686118 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-03-13T01:12:26.686183311Z I0313 01:12:26.686171 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-03-13T01:12:26.686243243Z I0313 01:12:26.686232 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-03-13T01:12:26.686308115Z I0313 01:12:26.686295 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-03-13T01:12:26.686380387Z I0313 01:12:26.686368 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-03-13T01:12:26.686463829Z I0313 01:12:26.686451 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-03-13T01:12:26.686511411Z I0313 01:12:26.686499 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-03-13T01:12:26.686558422Z I0313 01:12:26.686547 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-03-13T01:12:26.688374923Z I0313 01:12:26.688307 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:12:26.688659361Z I0313 01:12:26.688617 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:12:26.688825655Z I0313 01:12:26.688779 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:12:26.689124004Z I0313 01:12:26.689090 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:12:26.697087597Z I0313 01:12:26.697056 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:12:26.705752549Z I0313 01:12:26.705694 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:12:26.731152870Z I0313 01:12:26.731110 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:12:26.736682965Z I0313 01:12:26.736662 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:12:26.746209711Z I0313 01:12:26.746159 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:12:26.787465836Z I0313 01:12:26.787408 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-13T01:13:18.763976578Z W0313 01:13:18.763509 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-13T01:13:18.763976578Z E0313 01:13:18.763939 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-13T01:13:27.028322996Z I0313 01:13:27.028201 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-03-13T01:13:27.228354625Z I0313 01:13:27.228289 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-03-13T01:13:30.709102784Z I0313 01:13:30.709039 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-03-13T01:13:34.820248426Z I0313 01:13:34.820166 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-03-13T01:13:38.048276072Z I0313 01:13:38.048217 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-03-13T01:13:43.741765822Z I0313 01:13:43.740450 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-03-13T01:13:45.716854831Z I0313 01:13:45.715857 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-03-13T01:13:45.753803125Z I0313 01:13:45.753745 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-03-13T01:13:46.972088033Z I0313 01:13:46.972040 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:13:47.235474124Z I0313 01:13:47.235375 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-03-13T01:13:53.217192471Z I0313 01:13:53.216931 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-03-13T01:13:56.812853967Z I0313 01:13:56.812779 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-03-13T01:13:56.812942139Z I0313 01:13:56.812904 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-03-13T01:13:56.814195334Z I0313 01:13:56.814106 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-13T01:13:56.913265217Z I0313 01:13:56.913215 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-13T01:14:01.136943410Z I0313 01:14:01.136869 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-03-13T01:14:01.785693407Z I0313 01:14:01.785253 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-03-13T01:14:09.391421375Z I0313 01:14:09.369394 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-03-13T01:14:09.427774542Z I0313 01:14:09.427513 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-03-13T01:14:09.775286549Z I0313 01:14:09.775227 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-13T01:14:14.982695585Z I0313 01:14:14.980660 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-13T01:14:17.211160175Z W0313 01:14:17.206655 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T01:14:17.211160175Z E0313 01:14:17.206692 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T01:14:26.945058924Z I0313 01:14:26.944987 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T01:14:26.945092345Z E0313 01:14:26.945058 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T01:14:35.479505782Z I0313 01:14:35.479454 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-03-13T01:14:35.508062700Z I0313 01:14:35.507844 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-znxkt" has been approved 2026-03-13T01:14:35.579056539Z I0313 01:14:35.578991 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-2kssq" has been approved 2026-03-13T01:14:36.233981258Z I0313 01:14:36.232167 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-13T01:14:37.398644873Z I0313 01:14:37.398552 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-13T01:14:39.940204078Z I0313 01:14:39.940126 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-03-13T01:14:56.958485875Z I0313 01:14:56.958385 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T01:14:56.958543466Z E0313 01:14:56.958500 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T01:15:00.047917451Z W0313 01:15:00.047793 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T01:15:00.047917451Z E0313 01:15:00.047895 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T01:15:26.972251208Z I0313 01:15:26.972103 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T01:15:26.972336830Z E0313 01:15:26.972248 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T01:15:50.145302832Z W0313 01:15:50.145203 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T01:15:50.145302832Z E0313 01:15:50.145270 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T01:15:53.591961628Z E0313 01:15:53.591859 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-13T01:15:56.984830968Z I0313 01:15:56.984698 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T01:15:56.984911400Z E0313 01:15:56.984864 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T01:16:26.999129785Z I0313 01:16:26.998989 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T01:16:26.999327460Z E0313 01:16:26.999178 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T01:16:27.340466621Z W0313 01:16:27.340374 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T01:16:27.340516583Z E0313 01:16:27.340468 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T01:16:53.594278781Z E0313 01:16:53.594202 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-policy-controller-lock) 2026-03-13T01:16:57.016017412Z I0313 01:16:57.015916 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T01:16:57.016179736Z E0313 01:16:57.016155 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T01:17:12.564056686Z W0313 01:17:12.563939 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T01:17:12.564056686Z E0313 01:17:12.564011 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T01:17:27.029183807Z I0313 01:17:27.029063 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T01:17:27.029242679Z E0313 01:17:27.029198 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T01:17:56.112456891Z W0313 01:17:56.112330 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-13T01:17:56.112456891Z E0313 01:17:56.112413 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-13T01:17:57.041694746Z I0313 01:17:57.041478 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-13T01:17:57.041694746Z E0313 01:17:57.041613 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-13T01:18:00.455873976Z I0313 01:18:00.455774 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found kube-controller-manager_current.log0000640000000000000000000011363315154662741033612 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-13T01:18:11.134770958Z I0313 01:18:11.134757 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: overlappingrangeipreservations.whereabouts.cni.cncf.io, uid: edb5d70a-cc5a-418e-b363-c985a03665a5]" virtual=false 2026-03-13T01:18:11.148921538Z I0313 01:18:11.148847 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: machines.machine.openshift.io, uid: 4ac6324b-b8a2-406a-80f6-4076282a6552]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.148921538Z I0313 01:18:11.148895 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: performanceprofiles.performance.openshift.io, uid: 990890d3-2e31-41df-9477-07467bfa81ca]" virtual=false 2026-03-13T01:18:11.161221070Z I0313 01:18:11.161139 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: machinesets.machine.openshift.io, uid: 6fd1452a-e32d-46c3-a891-acd99d8d1bab]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.161221070Z I0313 01:18:11.161193 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: podmonitors.monitoring.coreos.com, uid: 6337eb45-739e-4e0a-83db-3d7842794b78]" virtual=false 2026-03-13T01:18:11.204744058Z I0313 01:18:11.204622 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: metal3remediations.infrastructure.cluster.x-k8s.io, uid: 350114ba-ac13-4be4-abe7-6e377a3cc310]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.204744058Z I0313 01:18:11.204717 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: preprovisioningimages.metal3.io, uid: 5839c8ac-c1dd-405e-9b46-eb3c9a9a38d4]" virtual=false 2026-03-13T01:18:11.207660514Z I0313 01:18:11.207594 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: metal3remediationtemplates.infrastructure.cluster.x-k8s.io, uid: d766c6be-4d45-4a7b-829f-5d418ef33bbb]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.207682995Z I0313 01:18:11.207663 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: probes.monitoring.coreos.com, uid: 8ebdbe9f-d141-47f1-a20a-15b4927104fe]" virtual=false 2026-03-13T01:18:11.210606122Z I0313 01:18:11.210549 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: network-attachment-definitions.k8s.cni.cncf.io, uid: 114ab392-75df-4ad5-9430-928423e2452b]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"39128195-b05a-4bfe-b12c-5db14f567df0","controller":true,"blockOwnerDeletion":true}] 2026-03-13T01:18:11.210606122Z I0313 01:18:11.210575 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: profiles.tuned.openshift.io, uid: d56b7c73-eba8-4773-b340-e8154f48dde7]" virtual=false 2026-03-13T01:18:11.217221144Z I0313 01:18:11.217159 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: networks.config.openshift.io, uid: f5fcf255-7d82-4de8-ae92-c9306af33439]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.217221144Z I0313 01:18:11.217200 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: projecthelmchartrepositories.helm.openshift.io, uid: f0fda0c4-bcb7-4d1c-9dc1-8055b98da858]" virtual=false 2026-03-13T01:18:11.221107406Z I0313 01:18:11.221048 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: networks.operator.openshift.io, uid: 434211fe-de72-47e8-b70a-ea3957a7d6d9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.221107406Z I0313 01:18:11.221079 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: projects.config.openshift.io, uid: deb07592-dc00-4736-ad82-96c419687f76]" virtual=false 2026-03-13T01:18:11.228314435Z I0313 01:18:11.228229 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: nodes.config.openshift.io, uid: 21cd9ba8-5c9e-43b6-a6c6-e1a5acba565d]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.228394247Z I0313 01:18:11.228283 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: prometheuses.monitoring.coreos.com, uid: bb42000e-d316-477c-bc29-fb356a788d13]" virtual=false 2026-03-13T01:18:11.230697197Z I0313 01:18:11.230578 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: nodeslicepools.whereabouts.cni.cncf.io, uid: 4421dcc5-37f0-4822-86bb-ac02b2647dcd]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"39128195-b05a-4bfe-b12c-5db14f567df0","controller":true,"blockOwnerDeletion":true}] 2026-03-13T01:18:11.230697197Z I0313 01:18:11.230646 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: prometheusrules.monitoring.coreos.com, uid: 011721cf-51cc-4f5d-b0e2-dbcaad99e545]" virtual=false 2026-03-13T01:18:11.234991129Z I0313 01:18:11.234924 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: oauths.config.openshift.io, uid: c4fb2d48-54ba-4706-ba48-d54f2bd4fb17]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.234991129Z I0313 01:18:11.234950 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: provisionings.metal3.io, uid: 1d7a3640-34a7-486f-b185-5a8478a69934]" virtual=false 2026-03-13T01:18:11.237060223Z I0313 01:18:11.237015 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: olmconfigs.operators.coreos.com, uid: 17fa4453-69de-4bf4-a5c5-54f2a7447720]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.237060223Z I0313 01:18:11.237046 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: proxies.config.openshift.io, uid: 1afb4d74-9ebf-4a83-bce0-bf58a883a97e]" virtual=false 2026-03-13T01:18:11.241192021Z I0313 01:18:11.241124 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: olms.operator.openshift.io, uid: 51e5c841-f8be-4a46-a393-2a6be4f44b7c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.241192021Z I0313 01:18:11.241153 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: rangeallocations.security.internal.openshift.io, uid: 01e6a807-bae4-4ce4-8be3-a91d299626c1]" virtual=false 2026-03-13T01:18:11.243996415Z I0313 01:18:11.243951 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: openshiftapiservers.operator.openshift.io, uid: fd0268c5-7c6c-44dd-95c3-d0918474c82d]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.243996415Z I0313 01:18:11.243978 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: rolebindingrestrictions.authorization.openshift.io, uid: 30d137ba-45a6-4f47-a571-9da9fee53b61]" virtual=false 2026-03-13T01:18:11.247172848Z I0313 01:18:11.247113 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: openshiftcontrollermanagers.operator.openshift.io, uid: cca34b18-72b4-452e-a903-d133cceb1da2]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.247172848Z I0313 01:18:11.247138 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: schedulers.config.openshift.io, uid: fe86a632-2cfe-4d80-936d-40a539640e3d]" virtual=false 2026-03-13T01:18:11.252462146Z I0313 01:18:11.252404 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: operatorconditions.operators.coreos.com, uid: b71ffe44-1311-4c6d-b94e-4b07fc71541c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.252462146Z I0313 01:18:11.252432 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: securitycontextconstraints.security.openshift.io, uid: 1628fe94-1390-4109-a6f2-d5913d403e07]" virtual=false 2026-03-13T01:18:11.254476069Z I0313 01:18:11.254419 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: operatorgroups.operators.coreos.com, uid: 179b6e7e-becc-4abe-9898-20f46043fadd]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.254500810Z I0313 01:18:11.254467 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: servicecas.operator.openshift.io, uid: 7327fd46-fd8d-4ec6-ab0a-7be78f920b5e]" virtual=false 2026-03-13T01:18:11.257736544Z I0313 01:18:11.257268 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: operatorhubs.config.openshift.io, uid: 26ecffbb-3435-4f35-849b-b1de89eee0fa]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.257736544Z I0313 01:18:11.257349 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: servicemonitors.monitoring.coreos.com, uid: fb9df82d-b67e-48ed-afa3-917bed3c53bf]" virtual=false 2026-03-13T01:18:11.265998530Z I0313 01:18:11.265941 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: operators.operators.coreos.com, uid: ba3093c9-b3e1-4684-8368-cf40f43fc78f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.265998530Z I0313 01:18:11.265981 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: storages.operator.openshift.io, uid: e515de09-c3ab-4aed-b456-ae23d1f664cb]" virtual=false 2026-03-13T01:18:11.266033381Z I0313 01:18:11.265964 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: operatorpkis.network.operator.openshift.io, uid: a02aadef-0178-4fe9-a411-001a2659767d]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.266033381Z I0313 01:18:11.266015 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: storagestates.migration.k8s.io, uid: 8720ea4a-46ed-46d8-9826-5924816bc0f5]" virtual=false 2026-03-13T01:18:11.268884786Z I0313 01:18:11.268826 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: overlappingrangeipreservations.whereabouts.cni.cncf.io, uid: edb5d70a-cc5a-418e-b363-c985a03665a5]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"39128195-b05a-4bfe-b12c-5db14f567df0","controller":true,"blockOwnerDeletion":true}] 2026-03-13T01:18:11.268909836Z I0313 01:18:11.268876 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: storageversionmigrations.migration.k8s.io, uid: f254afa8-18f6-4de3-af76-0e1e9d2f529c]" virtual=false 2026-03-13T01:18:11.272920681Z I0313 01:18:11.272845 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" need=1 creating=1 2026-03-13T01:18:11.283715524Z I0313 01:18:11.282678 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: performanceprofiles.performance.openshift.io, uid: 990890d3-2e31-41df-9477-07467bfa81ca]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.283715524Z I0313 01:18:11.282735 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: subscriptions.operators.coreos.com, uid: f058c8dd-67ad-4c5e-af2f-67d80569b08c]" virtual=false 2026-03-13T01:18:11.284810952Z I0313 01:18:11.284756 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T01:18:11.293261353Z I0313 01:18:11.291559 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="18.74424ms" 2026-03-13T01:18:11.294028133Z I0313 01:18:11.293975 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: podmonitors.monitoring.coreos.com, uid: 6337eb45-739e-4e0a-83db-3d7842794b78]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.294053954Z I0313 01:18:11.294017 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: thanosrulers.monitoring.coreos.com, uid: 38d47054-88c8-4792-b3a1-50c3b62faa3d]" virtual=false 2026-03-13T01:18:11.298547912Z I0313 01:18:11.298495 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="6.88337ms" 2026-03-13T01:18:11.298687725Z I0313 01:18:11.298660 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="83.822µs" 2026-03-13T01:18:11.303248515Z I0313 01:18:11.303193 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T01:18:11.303447040Z I0313 01:18:11.303413 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="90.892µs" 2026-03-13T01:18:11.321815800Z I0313 01:18:11.321742 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="86.822µs" 2026-03-13T01:18:11.322655772Z I0313 01:18:11.322564 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T01:18:11.338013234Z I0313 01:18:11.337928 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: preprovisioningimages.metal3.io, uid: 5839c8ac-c1dd-405e-9b46-eb3c9a9a38d4]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.338013234Z I0313 01:18:11.337982 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: tuneds.tuned.openshift.io, uid: 0b23e9bf-94d6-4314-904e-72cc69d35f98]" virtual=false 2026-03-13T01:18:11.345851379Z I0313 01:18:11.343066 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: probes.monitoring.coreos.com, uid: 8ebdbe9f-d141-47f1-a20a-15b4927104fe]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.345851379Z I0313 01:18:11.343112 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: userdefinednetworks.k8s.ovn.org, uid: c99604cf-f2d8-497b-b011-6c0c50eb8a59]" virtual=false 2026-03-13T01:18:11.350436559Z I0313 01:18:11.350357 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: profiles.tuned.openshift.io, uid: d56b7c73-eba8-4773-b340-e8154f48dde7]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.350436559Z I0313 01:18:11.350394 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/ServiceCA, namespace: , name: cluster, uid: 475c343b-f6ab-4e7c-a637-41701452e412]" virtual=false 2026-03-13T01:18:11.352658687Z I0313 01:18:11.352553 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: projecthelmchartrepositories.helm.openshift.io, uid: f0fda0c4-bcb7-4d1c-9dc1-8055b98da858]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.352658687Z I0313 01:18:11.352604 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/CSISnapshotController, namespace: , name: cluster, uid: 4285180c-adc0-4e17-a2d2-afbe7145f6a1]" virtual=false 2026-03-13T01:18:11.354571057Z I0313 01:18:11.354538 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: projects.config.openshift.io, uid: deb07592-dc00-4736-ad82-96c419687f76]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.354594948Z I0313 01:18:11.354565 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/InsightsOperator, namespace: , name: cluster, uid: 711dd01b-8780-4c84-8042-17ce55721a5c]" virtual=false 2026-03-13T01:18:11.360300907Z I0313 01:18:11.360247 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: prometheusrules.monitoring.coreos.com, uid: 011721cf-51cc-4f5d-b0e2-dbcaad99e545]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.360300907Z I0313 01:18:11.360282 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[config.openshift.io/v1/APIServer, namespace: , name: cluster, uid: 23b929ba-731b-48b9-94fe-ea35592e5069]" virtual=false 2026-03-13T01:18:11.364196029Z I0313 01:18:11.364160 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: provisionings.metal3.io, uid: 1d7a3640-34a7-486f-b185-5a8478a69934]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.369799865Z I0313 01:18:11.369729 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: proxies.config.openshift.io, uid: 1afb4d74-9ebf-4a83-bce0-bf58a883a97e]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.371150311Z I0313 01:18:11.371113 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: rangeallocations.security.internal.openshift.io, uid: 01e6a807-bae4-4ce4-8be3-a91d299626c1]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.373930763Z I0313 01:18:11.373899 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: rolebindingrestrictions.authorization.openshift.io, uid: 30d137ba-45a6-4f47-a571-9da9fee53b61]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.378028650Z I0313 01:18:11.377980 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: prometheuses.monitoring.coreos.com, uid: bb42000e-d316-477c-bc29-fb356a788d13]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.380727701Z I0313 01:18:11.380695 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: schedulers.config.openshift.io, uid: fe86a632-2cfe-4d80-936d-40a539640e3d]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.383339789Z I0313 01:18:11.383299 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: securitycontextconstraints.security.openshift.io, uid: 1628fe94-1390-4109-a6f2-d5913d403e07]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.387051527Z I0313 01:18:11.387010 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: servicecas.operator.openshift.io, uid: 7327fd46-fd8d-4ec6-ab0a-7be78f920b5e]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.391131823Z I0313 01:18:11.391098 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: servicemonitors.monitoring.coreos.com, uid: fb9df82d-b67e-48ed-afa3-917bed3c53bf]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.393835274Z I0313 01:18:11.393795 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: storages.operator.openshift.io, uid: e515de09-c3ab-4aed-b456-ae23d1f664cb]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.398216049Z I0313 01:18:11.398159 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: storagestates.migration.k8s.io, uid: 8720ea4a-46ed-46d8-9826-5924816bc0f5]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.401272538Z I0313 01:18:11.401230 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: storageversionmigrations.migration.k8s.io, uid: f254afa8-18f6-4de3-af76-0e1e9d2f529c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.420849621Z I0313 01:18:11.420814 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: subscriptions.operators.coreos.com, uid: f058c8dd-67ad-4c5e-af2f-67d80569b08c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.427414742Z I0313 01:18:11.427361 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: thanosrulers.monitoring.coreos.com, uid: 38d47054-88c8-4792-b3a1-50c3b62faa3d]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.430088772Z I0313 01:18:11.430041 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: tuneds.tuned.openshift.io, uid: 0b23e9bf-94d6-4314-904e-72cc69d35f98]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}] 2026-03-13T01:18:11.434068556Z I0313 01:18:11.434012 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: userdefinednetworks.k8s.ovn.org, uid: c99604cf-f2d8-497b-b011-6c0c50eb8a59]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"39128195-b05a-4bfe-b12c-5db14f567df0","controller":true,"blockOwnerDeletion":true}] 2026-03-13T01:18:11.436974222Z I0313 01:18:11.436936 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/ServiceCA, namespace: , name: cluster, uid: 475c343b-f6ab-4e7c-a637-41701452e412]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d"}] 2026-03-13T01:18:11.441350867Z I0313 01:18:11.441310 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/CSISnapshotController, namespace: , name: cluster, uid: 4285180c-adc0-4e17-a2d2-afbe7145f6a1]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d"}] 2026-03-13T01:18:11.444254843Z I0313 01:18:11.444222 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/InsightsOperator, namespace: , name: cluster, uid: 711dd01b-8780-4c84-8042-17ce55721a5c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d"}] 2026-03-13T01:18:11.447114598Z I0313 01:18:11.447082 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/APIServer, namespace: , name: cluster, uid: 23b929ba-731b-48b9-94fe-ea35592e5069]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d"}] 2026-03-13T01:18:12.025938368Z I0313 01:18:12.025868 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="43.791µs" 2026-03-13T01:18:12.271210023Z I0313 01:18:12.271135 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="66.952µs" 2026-03-13T01:18:12.272314622Z I0313 01:18:12.271458 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="32.441µs" 2026-03-13T01:18:12.272314622Z I0313 01:18:12.271767 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="34.271µs" 2026-03-13T01:18:12.292566492Z I0313 01:18:12.292422 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="54.622µs" 2026-03-13T01:18:12.292566492Z I0313 01:18:12.292553 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="29.5µs" 2026-03-13T01:18:12.312210316Z I0313 01:18:12.311936 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="57.451µs" 2026-03-13T01:18:12.335351981Z I0313 01:18:12.335296 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="39.781µs" 2026-03-13T01:18:12.594006605Z I0313 01:18:12.593810 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="10.430762ms" 2026-03-13T01:18:13.609398954Z I0313 01:18:13.609318 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="138.614µs" 2026-03-13T01:18:13.960819266Z I0313 01:18:13.960559 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="352.071789ms" 2026-03-13T01:18:13.960909168Z I0313 01:18:13.960858 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="59.322µs" 2026-03-13T01:18:14.052765161Z I0313 01:18:14.049925 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="45.171µs" 2026-03-13T01:18:14.134300073Z I0313 01:18:14.134230 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="17.138808ms" kube-controller-manager_previous.log0000640000000000000000000003173215154662741034003 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-13T01:16:19.603197113Z I0313 01:16:19.603177 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-03-13T01:16:19.603197113Z I0313 01:16:19.603182 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-03-13T01:16:19.603197113Z I0313 01:16:19.603184 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-03-13T01:16:19.603197113Z I0313 01:16:19.603189 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-03-13T01:16:19.603197113Z I0313 01:16:19.603193 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-03-13T01:16:19.603208353Z I0313 01:16:19.603197 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-03-13T01:16:19.603208353Z I0313 01:16:19.603201 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-03-13T01:16:19.603208353Z I0313 01:16:19.603205 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-03-13T01:16:19.603218044Z I0313 01:16:19.603208 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-03-13T01:16:19.603218044Z I0313 01:16:19.603211 1 flags.go:64] FLAG: --secure-port="10257" 2026-03-13T01:16:19.603218044Z I0313 01:16:19.603215 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-03-13T01:16:19.603227844Z I0313 01:16:19.603218 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-03-13T01:16:19.603227844Z I0313 01:16:19.603222 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-03-13T01:16:19.603227844Z I0313 01:16:19.603225 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-03-13T01:16:19.603237494Z I0313 01:16:19.603228 1 flags.go:64] FLAG: --tls-cert-file="" 2026-03-13T01:16:19.603237494Z I0313 01:16:19.603232 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-03-13T01:16:19.603246424Z I0313 01:16:19.603236 1 flags.go:64] FLAG: --tls-min-version="" 2026-03-13T01:16:19.603246424Z I0313 01:16:19.603239 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-03-13T01:16:19.603246424Z I0313 01:16:19.603242 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-03-13T01:16:19.603255495Z I0313 01:16:19.603246 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-03-13T01:16:19.603255495Z I0313 01:16:19.603250 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-03-13T01:16:19.603264575Z I0313 01:16:19.603254 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-03-13T01:16:19.603264575Z I0313 01:16:19.603258 1 flags.go:64] FLAG: --v="2" 2026-03-13T01:16:19.603273625Z I0313 01:16:19.603263 1 flags.go:64] FLAG: --version="false" 2026-03-13T01:16:19.603273625Z I0313 01:16:19.603268 1 flags.go:64] FLAG: --vmodule="" 2026-03-13T01:16:19.603480441Z W0313 01:16:19.603448 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-03-13T01:16:19.603480441Z W0313 01:16:19.603458 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-03-13T01:16:19.603480441Z W0313 01:16:19.603462 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-03-13T01:16:19.603480441Z W0313 01:16:19.603466 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-03-13T01:16:19.603480441Z W0313 01:16:19.603468 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-03-13T01:16:19.603480441Z W0313 01:16:19.603471 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-03-13T01:16:19.603480441Z W0313 01:16:19.603474 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-03-13T01:16:19.603480441Z W0313 01:16:19.603477 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-03-13T01:16:19.603501611Z W0313 01:16:19.603481 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-03-13T01:16:19.603501611Z W0313 01:16:19.603484 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-03-13T01:16:19.603501611Z W0313 01:16:19.603486 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-03-13T01:16:19.603501611Z W0313 01:16:19.603490 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-03-13T01:16:19.603501611Z W0313 01:16:19.603492 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-03-13T01:16:19.603501611Z W0313 01:16:19.603495 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-03-13T01:16:19.603501611Z W0313 01:16:19.603498 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-03-13T01:16:19.603513342Z W0313 01:16:19.603501 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-03-13T01:16:19.603513342Z W0313 01:16:19.603505 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-03-13T01:16:19.603513342Z W0313 01:16:19.603508 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-03-13T01:16:19.603523552Z W0313 01:16:19.603511 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-03-13T01:16:19.603523552Z W0313 01:16:19.603515 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-03-13T01:16:19.603523552Z W0313 01:16:19.603518 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-03-13T01:16:19.603533252Z W0313 01:16:19.603521 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-03-13T01:16:19.603533252Z W0313 01:16:19.603524 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-03-13T01:16:19.603533252Z W0313 01:16:19.603528 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-03-13T01:16:19.603542792Z W0313 01:16:19.603532 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-03-13T01:16:19.603542792Z W0313 01:16:19.603536 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-03-13T01:16:19.603542792Z W0313 01:16:19.603539 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-03-13T01:16:19.603552193Z W0313 01:16:19.603542 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-03-13T01:16:19.603552193Z W0313 01:16:19.603545 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-03-13T01:16:19.603552193Z W0313 01:16:19.603548 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-03-13T01:16:19.603561523Z W0313 01:16:19.603551 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-03-13T01:16:19.603561523Z W0313 01:16:19.603554 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-03-13T01:16:19.603561523Z W0313 01:16:19.603558 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-03-13T01:16:19.603577203Z W0313 01:16:19.603560 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-03-13T01:16:19.603577203Z W0313 01:16:19.603563 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-03-13T01:16:19.603577203Z W0313 01:16:19.603566 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-03-13T01:16:19.603577203Z W0313 01:16:19.603569 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-03-13T01:16:19.603577203Z W0313 01:16:19.603572 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-03-13T01:16:19.603585714Z W0313 01:16:19.603575 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-03-13T01:16:19.603585714Z W0313 01:16:19.603579 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-03-13T01:16:19.603585714Z W0313 01:16:19.603582 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-03-13T01:16:19.603593534Z W0313 01:16:19.603585 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-03-13T01:16:19.603593534Z W0313 01:16:19.603588 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-03-13T01:16:19.603593534Z W0313 01:16:19.603590 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-03-13T01:16:19.603601324Z W0313 01:16:19.603593 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-03-13T01:16:19.603601324Z W0313 01:16:19.603596 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-03-13T01:16:19.603601324Z W0313 01:16:19.603598 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-03-13T01:16:19.603609134Z W0313 01:16:19.603602 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-03-13T01:16:19.603609134Z W0313 01:16:19.603605 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-03-13T01:16:19.603616554Z W0313 01:16:19.603608 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-03-13T01:16:19.603616554Z W0313 01:16:19.603611 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-03-13T01:16:19.603616554Z W0313 01:16:19.603614 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-03-13T01:16:19.603624755Z W0313 01:16:19.603617 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-03-13T01:16:19.603624755Z W0313 01:16:19.603619 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-03-13T01:16:19.603648805Z W0313 01:16:19.603622 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-03-13T01:16:19.603648805Z W0313 01:16:19.603626 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-03-13T01:16:19.603648805Z W0313 01:16:19.603631 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-03-13T01:16:19.603648805Z W0313 01:16:19.603634 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-03-13T01:16:19.603660376Z W0313 01:16:19.603648 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-03-13T01:16:19.603660376Z W0313 01:16:19.603652 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-03-13T01:16:19.603660376Z W0313 01:16:19.603655 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-03-13T01:16:19.603678246Z W0313 01:16:19.603660 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-03-13T01:16:19.603678246Z W0313 01:16:19.603664 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-03-13T01:16:19.603678246Z W0313 01:16:19.603668 1 feature_gate.go:330] unrecognized feature gate: Example 2026-03-13T01:16:19.603678246Z W0313 01:16:19.603671 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-03-13T01:16:19.603678246Z W0313 01:16:19.603674 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-03-13T01:16:19.603689246Z W0313 01:16:19.603678 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-03-13T01:16:19.603689246Z W0313 01:16:19.603681 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-03-13T01:16:19.603689246Z W0313 01:16:19.603686 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-03-13T01:16:19.603698967Z W0313 01:16:19.603691 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-03-13T01:16:19.603698967Z W0313 01:16:19.603695 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-03-13T01:16:19.603707787Z W0313 01:16:19.603699 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-03-13T01:16:19.934743695Z I0313 01:16:19.933406 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-03-13T01:16:19.936898633Z I0313 01:16:19.936844 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2026-03-13T01:17:20.728312868Z E0313 01:17:20.728188 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps extension-apiserver-authentication)" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002735015154662741024634 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"62fe89be-419b-427f-ba06-a5b009e32680","resourceVersion":"10283","creationTimestamp":"2026-03-13T01:12:50Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.mirror":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.seen":"2026-03-13T01:11:02.521508086Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c49bf4d8-4e43-40fb-93c2-f084fdfa1bba","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:56Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:56Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T01:13:19Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-03-13T01:11:14Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","containerID":"cri-o://be52d87237e2c88231046564bd2dfcdbd780faa45f3647245e1d0a9837eb7182","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-03-13T01:17:46Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-13T01:16:19Z","finishedAt":"2026-03-13T01:17:20Z","containerID":"cri-o://f90ce908443d9a8a4935d9c526f464812bacbaf55d563a98ad6570bafafa4d36"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://ae1c74ac713339ebe951cea485ddb317986dccb644eb4d3021ce0d21c709fe41","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000015323215154662741044536 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-v9pv62026-03-13T01:17:39.109096142Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T01:17:39.109096142Z KubeletVersion: (string) "" 2026-03-13T01:17:39.109096142Z }) 2026-03-13T01:17:39.109096142Z I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T01:17:39.109096142Z I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T01:17:39.109096142Z I0313 01:14:37.380551 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:17:39.109096142Z I0313 01:14:37.380562 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:17:39.109096142Z I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T01:17:39.109096142Z I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T01:17:39.109096142Z F0313 01:15:21.457056 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:39.109340894Z I0313 01:17:39.109310 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' installer errors: installer: icy-controller-config", 2026-03-13T01:17:39.109340894Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-13T01:17:39.109340894Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-13T01:17:39.109340894Z (string) (len=17) "serviceaccount-ca", 2026-03-13T01:17:39.109340894Z (string) (len=10) "service-ca", 2026-03-13T01:17:39.109340894Z (string) (len=15) "recycler-config" 2026-03-13T01:17:39.109340894Z }, 2026-03-13T01:17:39.109340894Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:17:39.109340894Z (string) (len=12) "cloud-config" 2026-03-13T01:17:39.109340894Z }, 2026-03-13T01:17:39.109340894Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-13T01:17:39.109340894Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-13T01:17:39.109340894Z (string) (len=10) "csr-signer" 2026-03-13T01:17:39.109340894Z }, 2026-03-13T01:17:39.109340894Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-13T01:17:39.109340894Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T01:17:39.109340894Z (string) (len=20) "aggregator-client-ca", 2026-03-13T01:17:39.109340894Z (string) (len=9) "client-ca" 2026-03-13T01:17:39.109340894Z }, 2026-03-13T01:17:39.109340894Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:17:39.109340894Z (string) (len=17) "trusted-ca-bundle" 2026-03-13T01:17:39.109340894Z }, 2026-03-13T01:17:39.109340894Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-13T01:17:39.109340894Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T01:17:39.109340894Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T01:17:39.109340894Z Timeout: (time.Duration) 2m0s, 2026-03-13T01:17:39.109340894Z StaticPodManifestsLockFile: (string) "", 2026-03-13T01:17:39.109340894Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T01:17:39.109340894Z KubeletVersion: (string) "" 2026-03-13T01:17:39.109340894Z }) 2026-03-13T01:17:39.109340894Z I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T01:17:39.109340894Z I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T01:17:39.109340894Z I0313 01:14:37.380551 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:17:39.109340894Z I0313 01:14:37.380562 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:17:39.109340894Z I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T01:17:39.109340894Z I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T01:17:39.109340894Z F0313 01:15:21.457056 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:39.110232118Z W0313 01:17:39.110210 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-03-13T01:17:39.110232118Z W0313 01:17:39.110225 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-03-13T01:17:39.110246287Z W0313 01:17:39.110229 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-13T01:17:39.135038422Z I0313 01:17:39.134979 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:17:40.309920445Z I0313 01:17:40.309845 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:40.310166297Z E0313 01:17:40.310119 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:40.910155118Z I0313 01:17:40.910051 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:40.910445097Z E0313 01:17:40.910383 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:41.311678124Z E0313 01:17:41.309471 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:41.311678124Z I0313 01:17:41.309529 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:41.709530270Z E0313 01:17:41.709376 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:41.709530270Z I0313 01:17:41.709415 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:42.113220037Z E0313 01:17:42.113136 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:42.113220037Z I0313 01:17:42.113177 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:44.679253960Z I0313 01:17:44.679186 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:44.679339543Z E0313 01:17:44.679314 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:47.845550496Z E0313 01:17:47.845473 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-controller-manager), \"assets/kube-controller-manager/leader-election-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io system:openshift:leader-locking-kube-controller-manager), \"assets/kube-controller-manager/leader-election-cluster-policy-controller-role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:leader-election-lock-cluster-policy-controller)]" 2026-03-13T01:17:47.848438052Z I0313 01:17:47.848386 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:17:47.853770281Z E0313 01:17:47.853729 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:47.854541881Z I0313 01:17:47.853626 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:49.872403330Z I0313 01:17:49.872254 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:49.872621616Z E0313 01:17:49.872543 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:52.351586214Z W0313 01:17:52.351490 1 dynamic_operator_client.go:355] .status.conditions["KubeControllerManagerStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-03-13T01:17:52.387546975Z I0313 01:17:52.387479 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:17:52.442855861Z I0313 01:17:52.442759 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:17:53.121949604Z I0313 01:17:53.121857 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready" 2026-03-13T01:17:53.124905011Z I0313 01:17:53.124394 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:00Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:28Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:27Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:17:53.140772666Z E0313 01:17:53.136722 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T01:17:53.146599008Z I0313 01:17:53.146331 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:00Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:28Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:27Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:17:53.167564477Z E0313 01:17:53.167464 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T01:17:53.183741820Z I0313 01:17:53.183033 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:00Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:28Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:27Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:17:53.190466266Z E0313 01:17:53.189217 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T01:17:53.192801227Z I0313 01:17:53.192128 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:00Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:28Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:27Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:17:53.213987961Z I0313 01:17:53.213891 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\nNodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)" 2026-03-13T01:17:53.217401870Z I0313 01:17:53.217142 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:00Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:28Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:27Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:17:53.229392784Z E0313 01:17:53.229317 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-13T01:17:53.795295085Z I0313 01:17:53.795211 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:53.795461710Z E0313 01:17:53.795400 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:54.991789199Z I0313 01:17:54.991672 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:17:54.991858331Z E0313 01:17:54.991837 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:17:55.403746835Z I0313 01:17:55.403309 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-3-retry-1-master-0 -n openshift-kube-controller-manager because it was missing 2026-03-13T01:17:56.196989962Z I0313 01:17:56.196881 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Pending phase 2026-03-13T01:17:58.210691242Z I0313 01:17:58.209364 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-13T01:17:59.594935187Z I0313 01:17:59.594842 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-13T01:18:02.647027836Z I0313 01:18:02.646952 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:18:02.647395686Z I0313 01:18:02.647359 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:00Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:28Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:27Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:18:02.663894388Z I0313 01:18:02.660456 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)" to "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: " 2026-03-13T01:18:03.793710619Z I0313 01:18:03.790403 1 request.go:700] Waited for 1.128894367s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/configmaps/config 2026-03-13T01:18:03.992231051Z E0313 01:18:03.992135 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:18:03.992736665Z I0313 01:18:03.992673 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:18:04.394229176Z I0313 01:18:04.394038 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-13T01:18:11.391125773Z I0313 01:18:11.391049 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:18:11.391265517Z E0313 01:18:11.391247 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" kube-controller-manager-operator_previous.log0000640000000000000000000004474315154662741044736 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-v9pv62026-03-13T01:14:35.733828250Z I0313 01:14:35.733217 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:00Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:28Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:27Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:27Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:14:35.745696359Z I0313 01:14:35.737968 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:14:35.765934974Z I0313 01:14:35.765752 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "GarbageCollectorDegraded: error fetching rules: Get \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\nNodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready" 2026-03-13T01:14:36.135976373Z I0313 01:14:36.135885 1 request.go:700] Waited for 1.194353514s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/default/endpoints/kubernetes 2026-03-13T01:14:36.225437519Z E0313 01:14:36.224925 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-03-13T01:14:36.226548148Z I0313 01:14:36.225909 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"3cd6d237-7efa-47e8-8e39-d39d20c342fa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-03-13T01:14:36.390898447Z I0313 01:14:36.390710 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="bdd18dd8193ea096b72925666e73b93198e6e83f64ff9a01658c29bebad5143e") 2026-03-13T01:14:36.390898447Z W0313 01:14:36.390756 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.key was created 2026-03-13T01:14:36.390898447Z I0313 01:14:36.390864 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="b8c783f7b7d77cdbb6b029eda8203f91916a7f5c83627ba8cba8f6a92e5c5aa8") 2026-03-13T01:14:36.392232413Z I0313 01:14:36.391213 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-13T01:14:36.392232413Z I0313 01:14:36.391239 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-13T01:14:36.399671853Z I0313 01:14:36.396134 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-13T01:14:36.399671853Z E0313 01:14:36.398398 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/recycler-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T01:14:36.399671853Z I0313 01:14:36.398427 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-13T01:14:36.399671853Z I0313 01:14:36.398513 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T01:14:36.399699724Z E0313 01:14:36.399679 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-13T01:14:36.399707434Z I0313 01:14:36.399699 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-13T01:14:36.399714534Z I0313 01:14:36.399706 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-13T01:14:36.400751732Z I0313 01:14:36.399720 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-921151866/tls.crt::/tmp/serving-cert-921151866/tls.key" 2026-03-13T01:14:36.400751732Z I0313 01:14:36.400034 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T01:14:36.401654657Z E0313 01:14:36.400912 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T01:14:36.401654657Z I0313 01:14:36.400939 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:36.401654657Z I0313 01:14:36.400944 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:36.401654657Z I0313 01:14:36.400955 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-13T01:14:36.401654657Z I0313 01:14:36.400964 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-13T01:14:36.401654657Z I0313 01:14:36.401121 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-13T01:14:36.401654657Z I0313 01:14:36.401184 1 base_controller.go:181] Shutting down Installer ... 2026-03-13T01:14:36.402997373Z W0313 01:14:36.402810 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-13T01:14:36.402997373Z W0313 01:14:36.402824 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-13T01:14:36.402997373Z W0313 01:14:36.402828 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-13T01:14:36.402997373Z E0313 01:14:36.402912 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-13T01:14:36.402997373Z I0313 01:14:36.402923 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-13T01:14:36.402997373Z I0313 01:14:36.402936 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T01:14:36.402997373Z I0313 01:14:36.402946 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T01:14:36.402997373Z I0313 01:14:36.402955 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-13T01:14:36.402997373Z I0313 01:14:36.402962 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-13T01:14:36.402997373Z I0313 01:14:36.402972 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T01:14:36.402997373Z I0313 01:14:36.402979 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-13T01:14:36.403019643Z I0313 01:14:36.402997 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-13T01:14:36.403019643Z I0313 01:14:36.403000 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-13T01:14:36.403019643Z I0313 01:14:36.403009 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-13T01:14:36.403056544Z E0313 01:14:36.403033 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T01:14:36.403056544Z I0313 01:14:36.403047 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-13T01:14:36.403065105Z I0313 01:14:36.403055 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-13T01:14:36.403065105Z I0313 01:14:36.403062 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.403963 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404028 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404039 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404049 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404177 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404185 1 builder.go:335] server exited 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404229 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404254 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404259 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404341 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404374 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404385 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404398 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404405 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404409 1 controller_manager.go:54] RevisionController controller terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404416 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404423 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404433 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404439 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404455 1 controller_manager.go:54] PruneController controller terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404448 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404485 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404488 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404494 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404502 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404503 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404520 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404526 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404550 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404557 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404569 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404576 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404592 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404599 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404605 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404612 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-13T01:14:36.404651487Z I0313 01:14:36.404619 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-13T01:14:36.404678728Z I0313 01:14:36.404649 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-13T01:14:36.404678728Z I0313 01:14:36.404657 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-13T01:14:36.404678728Z I0313 01:14:36.404662 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-13T01:14:36.404694788Z I0313 01:14:36.404672 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-13T01:14:36.404694788Z I0313 01:14:36.404683 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-13T01:14:36.404694788Z I0313 01:14:36.404689 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-13T01:14:36.404694788Z I0313 01:14:36.404691 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-13T01:14:36.404703399Z I0313 01:14:36.404693 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-13T01:14:36.404703399Z I0313 01:14:36.404695 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-13T01:14:36.404703399Z I0313 01:14:36.404700 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-13T01:14:36.404711159Z I0313 01:14:36.404702 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-13T01:14:36.404720139Z I0313 01:14:36.404714 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-13T01:14:36.404720139Z I0313 01:14:36.404715 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-13T01:14:36.404727679Z I0313 01:14:36.404720 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-13T01:14:36.404727679Z I0313 01:14:36.404724 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-13T01:14:36.404735100Z I0313 01:14:36.404725 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T01:14:36.404735100Z I0313 01:14:36.404732 1 controller_manager.go:54] Installer controller terminated 2026-03-13T01:14:36.406733263Z W0313 01:14:36.405058 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-86d7cdfdfb-v9pv6.json0000640000000000000000000001450315154662741033645 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-86d7cdfdfb-v9pv6","generateName":"kube-controller-manager-operator-86d7cdfdfb-","namespace":"openshift-kube-controller-manager-operator","uid":"58035e42-37d8-48f6-9861-9b4ce6014119","resourceVersion":"9641","creationTimestamp":"2026-03-13T01:11:36Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"86d7cdfdfb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-86d7cdfdfb","uid":"eb8176f2-fced-4ac9-83d3-2b309ccd66ef","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:35768a0c3eb24134dd38633e8acfc7db69ee96b2fd660e9bba3b8c996452fef7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-03-13T01:13:10Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-13T01:14:37Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T01:13:25Z","finishedAt":"2026-03-13T01:14:36Z","containerID":"cri-o://662b7543988e07c43f9b30d00fca727f77728c7aa21bd39d21414f56d158c6c9"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://ac8bc98fe2e8dc99665ece6e4cbb170176bcf297370531768be4fdddc77674cc","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-3-retry-1-master-0/installer_current.log0000640000000000000000000001364115154662741032315 0ustar00000000000000002026-03-13T01:17:57.640963961Z I0313 01:17:57.640532 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00064b720 cert-dir:0xc00064b900 cert-secrets:0xc00064b680 configmaps:0xc00064b220 namespace:0xc00064b040 optional-cert-configmaps:0xc00064b860 optional-configmaps:0xc00064b360 optional-secrets:0xc00064b2c0 pod:0xc00064b0e0 pod-manifest-dir:0xc00064b4a0 resource-dir:0xc00064b400 revision:0xc00064afa0 secrets:0xc00064b180 v:0xc0005d6500] [0xc0005d6500 0xc00064afa0 0xc00064b040 0xc00064b0e0 0xc00064b400 0xc00064b4a0 0xc00064b220 0xc00064b360 0xc00064b180 0xc00064b2c0 0xc00064b900 0xc00064b720 0xc00064b860 0xc00064b680] [] map[cert-configmaps:0xc00064b720 cert-dir:0xc00064b900 cert-secrets:0xc00064b680 configmaps:0xc00064b220 help:0xc0005d6aa0 kubeconfig:0xc00064af00 log-flush-frequency:0xc0005d6460 namespace:0xc00064b040 optional-cert-configmaps:0xc00064b860 optional-cert-secrets:0xc00064b7c0 optional-configmaps:0xc00064b360 optional-secrets:0xc00064b2c0 pod:0xc00064b0e0 pod-manifest-dir:0xc00064b4a0 pod-manifests-lock-file:0xc00064b5e0 resource-dir:0xc00064b400 revision:0xc00064afa0 secrets:0xc00064b180 timeout-duration:0xc00064b540 v:0xc0005d6500 vmodule:0xc0005d65a0] [0xc00064af00 0xc00064afa0 0xc00064b040 0xc00064b0e0 0xc00064b180 0xc00064b220 0xc00064b2c0 0xc00064b360 0xc00064b400 0xc00064b4a0 0xc00064b540 0xc00064b5e0 0xc00064b680 0xc00064b720 0xc00064b7c0 0xc00064b860 0xc00064b900 0xc0005d6460 0xc0005d6500 0xc0005d65a0 0xc0005d6aa0] [0xc00064b720 0xc00064b900 0xc00064b680 0xc00064b220 0xc0005d6aa0 0xc00064af00 0xc0005d6460 0xc00064b040 0xc00064b860 0xc00064b7c0 0xc00064b360 0xc00064b2c0 0xc00064b0e0 0xc00064b4a0 0xc00064b5e0 0xc00064b400 0xc00064afa0 0xc00064b180 0xc00064b540 0xc0005d6500 0xc0005d65a0] map[104:0xc0005d6aa0 118:0xc0005d6500] [] -1 0 0xc00004d9b0 true 0x77b900 []} 2026-03-13T01:17:57.641203027Z I0313 01:17:57.640966 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000a3c820)({ 2026-03-13T01:17:57.641203027Z KubeConfig: (string) "", 2026-03-13T01:17:57.641203027Z KubeClient: (kubernetes.Interface) , 2026-03-13T01:17:57.641203027Z Revision: (string) (len=1) "3", 2026-03-13T01:17:57.641203027Z NodeName: (string) "", 2026-03-13T01:17:57.641203027Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-03-13T01:17:57.641203027Z Clock: (clock.RealClock) { 2026-03-13T01:17:57.641203027Z }, 2026-03-13T01:17:57.641203027Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-03-13T01:17:57.641203027Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T01:17:57.641203027Z (string) (len=27) "service-account-private-key", 2026-03-13T01:17:57.641203027Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T01:17:57.641203027Z }, 2026-03-13T01:17:57.641203027Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:17:57.641203027Z (string) (len=12) "serving-cert" 2026-03-13T01:17:57.641203027Z }, 2026-03-13T01:17:57.641203027Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-13T01:17:57.641203027Z (string) (len=27) "kube-controller-manager-pod", 2026-03-13T01:17:57.641203027Z (string) (len=6) "config", 2026-03-13T01:17:57.641203027Z (string) (len=32) "cluster-policy-controller-config", 2026-03-13T01:17:57.641203027Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-13T01:17:57.641203027Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-13T01:17:57.641203027Z (string) (len=17) "serviceaccount-ca", 2026-03-13T01:17:57.641203027Z (string) (len=10) "service-ca", 2026-03-13T01:17:57.641203027Z (string) (len=15) "recycler-config" 2026-03-13T01:17:57.641203027Z }, 2026-03-13T01:17:57.641203027Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:17:57.641203027Z (string) (len=12) "cloud-config" 2026-03-13T01:17:57.641203027Z }, 2026-03-13T01:17:57.641203027Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-13T01:17:57.641203027Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-13T01:17:57.641203027Z (string) (len=10) "csr-signer" 2026-03-13T01:17:57.641203027Z }, 2026-03-13T01:17:57.641203027Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-13T01:17:57.641203027Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T01:17:57.641203027Z (string) (len=20) "aggregator-client-ca", 2026-03-13T01:17:57.641203027Z (string) (len=9) "client-ca" 2026-03-13T01:17:57.641203027Z }, 2026-03-13T01:17:57.641203027Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:17:57.641203027Z (string) (len=17) "trusted-ca-bundle" 2026-03-13T01:17:57.641203027Z }, 2026-03-13T01:17:57.641203027Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-13T01:17:57.641203027Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T01:17:57.641203027Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T01:17:57.641203027Z Timeout: (time.Duration) 2m0s, 2026-03-13T01:17:57.641203027Z StaticPodManifestsLockFile: (string) "", 2026-03-13T01:17:57.641203027Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T01:17:57.641203027Z KubeletVersion: (string) "" 2026-03-13T01:17:57.641203027Z }) 2026-03-13T01:17:57.642285535Z I0313 01:17:57.642195 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T01:17:57.736320715Z I0313 01:17:57.736219 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T01:17:57.736377626Z I0313 01:17:57.736325 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:17:57.736377626Z I0313 01:17:57.736349 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:17:57.739811876Z I0313 01:17:57.739722 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 config/pod/openshift-kube-controller-manager/logs/installer-3-master-0/installer_current.log0000640000000000000000000001443515154662741031016 0ustar00000000000000002026-03-13T01:14:37.336031530Z I0313 01:14:37.335771 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000be4000 cert-dir:0xc000be41e0 cert-secrets:0xc000bb7ea0 configmaps:0xc000bb7a40 namespace:0xc000bb7860 optional-cert-configmaps:0xc000be4140 optional-configmaps:0xc000bb7b80 optional-secrets:0xc000bb7ae0 pod:0xc000bb7900 pod-manifest-dir:0xc000bb7cc0 resource-dir:0xc000bb7c20 revision:0xc000bb77c0 secrets:0xc000bb79a0 v:0xc000be4be0] [0xc000be4be0 0xc000bb77c0 0xc000bb7860 0xc000bb7900 0xc000bb7c20 0xc000bb7cc0 0xc000bb7a40 0xc000bb7b80 0xc000bb79a0 0xc000bb7ae0 0xc000be41e0 0xc000be4000 0xc000be4140 0xc000bb7ea0] [] map[cert-configmaps:0xc000be4000 cert-dir:0xc000be41e0 cert-secrets:0xc000bb7ea0 configmaps:0xc000bb7a40 help:0xc000be4fa0 kubeconfig:0xc000bb7720 log-flush-frequency:0xc000be4b40 namespace:0xc000bb7860 optional-cert-configmaps:0xc000be4140 optional-cert-secrets:0xc000be40a0 optional-configmaps:0xc000bb7b80 optional-secrets:0xc000bb7ae0 pod:0xc000bb7900 pod-manifest-dir:0xc000bb7cc0 pod-manifests-lock-file:0xc000bb7e00 resource-dir:0xc000bb7c20 revision:0xc000bb77c0 secrets:0xc000bb79a0 timeout-duration:0xc000bb7d60 v:0xc000be4be0 vmodule:0xc000be4c80] [0xc000bb7720 0xc000bb77c0 0xc000bb7860 0xc000bb7900 0xc000bb79a0 0xc000bb7a40 0xc000bb7ae0 0xc000bb7b80 0xc000bb7c20 0xc000bb7cc0 0xc000bb7d60 0xc000bb7e00 0xc000bb7ea0 0xc000be4000 0xc000be40a0 0xc000be4140 0xc000be41e0 0xc000be4b40 0xc000be4be0 0xc000be4c80 0xc000be4fa0] [0xc000be4000 0xc000be41e0 0xc000bb7ea0 0xc000bb7a40 0xc000be4fa0 0xc000bb7720 0xc000be4b40 0xc000bb7860 0xc000be4140 0xc000be40a0 0xc000bb7b80 0xc000bb7ae0 0xc000bb7900 0xc000bb7cc0 0xc000bb7e00 0xc000bb7c20 0xc000bb77c0 0xc000bb79a0 0xc000bb7d60 0xc000be4be0 0xc000be4c80] map[104:0xc000be4fa0 118:0xc000be4be0] [] -1 0 0xc000bd08d0 true 0x77b900 []} 2026-03-13T01:14:37.336135093Z I0313 01:14:37.336066 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000ade4e0)({ 2026-03-13T01:14:37.336135093Z KubeConfig: (string) "", 2026-03-13T01:14:37.336135093Z KubeClient: (kubernetes.Interface) , 2026-03-13T01:14:37.336135093Z Revision: (string) (len=1) "3", 2026-03-13T01:14:37.336135093Z NodeName: (string) "", 2026-03-13T01:14:37.336135093Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-03-13T01:14:37.336135093Z Clock: (clock.RealClock) { 2026-03-13T01:14:37.336135093Z }, 2026-03-13T01:14:37.336135093Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-03-13T01:14:37.336135093Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T01:14:37.336135093Z (string) (len=27) "service-account-private-key", 2026-03-13T01:14:37.336135093Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T01:14:37.336135093Z }, 2026-03-13T01:14:37.336135093Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:14:37.336135093Z (string) (len=12) "serving-cert" 2026-03-13T01:14:37.336135093Z }, 2026-03-13T01:14:37.336135093Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-13T01:14:37.336135093Z (string) (len=27) "kube-controller-manager-pod", 2026-03-13T01:14:37.336135093Z (string) (len=6) "config", 2026-03-13T01:14:37.336135093Z (string) (len=32) "cluster-policy-controller-config", 2026-03-13T01:14:37.336135093Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-13T01:14:37.336135093Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-13T01:14:37.336135093Z (string) (len=17) "serviceaccount-ca", 2026-03-13T01:14:37.336135093Z (string) (len=10) "service-ca", 2026-03-13T01:14:37.336135093Z (string) (len=15) "recycler-config" 2026-03-13T01:14:37.336135093Z }, 2026-03-13T01:14:37.336135093Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:14:37.336135093Z (string) (len=12) "cloud-config" 2026-03-13T01:14:37.336135093Z }, 2026-03-13T01:14:37.336135093Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-13T01:14:37.336135093Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-13T01:14:37.336135093Z (string) (len=10) "csr-signer" 2026-03-13T01:14:37.336135093Z }, 2026-03-13T01:14:37.336135093Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-13T01:14:37.336135093Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T01:14:37.336135093Z (string) (len=20) "aggregator-client-ca", 2026-03-13T01:14:37.336135093Z (string) (len=9) "client-ca" 2026-03-13T01:14:37.336135093Z }, 2026-03-13T01:14:37.336135093Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:14:37.336135093Z (string) (len=17) "trusted-ca-bundle" 2026-03-13T01:14:37.336135093Z }, 2026-03-13T01:14:37.336135093Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-13T01:14:37.336135093Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T01:14:37.336135093Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T01:14:37.336135093Z Timeout: (time.Duration) 2m0s, 2026-03-13T01:14:37.336135093Z StaticPodManifestsLockFile: (string) "", 2026-03-13T01:14:37.336135093Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T01:14:37.336135093Z KubeletVersion: (string) "" 2026-03-13T01:14:37.336135093Z }) 2026-03-13T01:14:37.338205318Z I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T01:14:37.388319966Z I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T01:14:37.388319966Z I0313 01:14:37.380551 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:14:37.388319966Z I0313 01:14:37.380562 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:14:37.456057327Z I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T01:15:07.455977725Z I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T01:15:21.457179720Z F0313 01:15:21.457056 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-controller-manager/installer-3-master-0.json0000640000000000000000000001725615154662741024507 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-controller-manager","uid":"29e096ea-ca9d-477b-b0aa-1d10244d51d9","resourceVersion":"9845","creationTimestamp":"2026-03-13T01:14:35Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.60/23\"],\"mac_address\":\"0a:58:0a:80:00:3c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.60/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.60\"\n ],\n \"mac\": \"0a:58:0a:80:00:3c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"858e7e64-8ae8-48d4-9707-4c9cc1906e95"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-ctg9b"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:16:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:16:18Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:16:18Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:35Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.60","podIPs":[{"ip":"10.128.0.60"}],"startTime":"2026-03-13T01:14:35Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nI0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nF0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-13T01:14:36Z","finishedAt":"2026-03-13T01:15:21Z","containerID":"cri-o://167e9a0418be9c64d38402cc471015911f91f7d101628f86049fb49485d8495a"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://167e9a0418be9c64d38402cc471015911f91f7d101628f86049fb49485d8495a","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715154662741027216 0ustar00000000000000002026-03-13T01:14:36.757171096Z I0313 01:14:36.752320 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000abf540 cert-dir:0xc000abf720 cert-secrets:0xc000abf4a0 configmaps:0xc000abf040 namespace:0xc000abee60 optional-cert-configmaps:0xc000abf680 optional-cert-secrets:0xc000abf5e0 optional-configmaps:0xc000abf180 optional-secrets:0xc000abf0e0 pod:0xc000abef00 pod-manifest-dir:0xc000abf2c0 resource-dir:0xc000abf220 revision:0xc000abedc0 secrets:0xc000abefa0 v:0xc000acabe0] [0xc000acabe0 0xc000abedc0 0xc000abee60 0xc000abef00 0xc000abf220 0xc000abf2c0 0xc000abf040 0xc000abf180 0xc000abefa0 0xc000abf0e0 0xc000abf720 0xc000abf540 0xc000abf680 0xc000abf4a0 0xc000abf5e0] [] map[cert-configmaps:0xc000abf540 cert-dir:0xc000abf720 cert-secrets:0xc000abf4a0 configmaps:0xc000abf040 help:0xc000acafa0 kubeconfig:0xc000abed20 log-flush-frequency:0xc000acab40 namespace:0xc000abee60 optional-cert-configmaps:0xc000abf680 optional-cert-secrets:0xc000abf5e0 optional-configmaps:0xc000abf180 optional-secrets:0xc000abf0e0 pod:0xc000abef00 pod-manifest-dir:0xc000abf2c0 pod-manifests-lock-file:0xc000abf400 resource-dir:0xc000abf220 revision:0xc000abedc0 secrets:0xc000abefa0 timeout-duration:0xc000abf360 v:0xc000acabe0 vmodule:0xc000acac80] [0xc000abed20 0xc000abedc0 0xc000abee60 0xc000abef00 0xc000abefa0 0xc000abf040 0xc000abf0e0 0xc000abf180 0xc000abf220 0xc000abf2c0 0xc000abf360 0xc000abf400 0xc000abf4a0 0xc000abf540 0xc000abf5e0 0xc000abf680 0xc000abf720 0xc000acab40 0xc000acabe0 0xc000acac80 0xc000acafa0] [0xc000abf540 0xc000abf720 0xc000abf4a0 0xc000abf040 0xc000acafa0 0xc000abed20 0xc000acab40 0xc000abee60 0xc000abf680 0xc000abf5e0 0xc000abf180 0xc000abf0e0 0xc000abef00 0xc000abf2c0 0xc000abf400 0xc000abf220 0xc000abedc0 0xc000abefa0 0xc000abf360 0xc000acabe0 0xc000acac80] map[104:0xc000acafa0 118:0xc000acabe0] [] -1 0 0xc000ab8a80 true 0xae2020 []} 2026-03-13T01:14:36.757171096Z I0313 01:14:36.752533 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000455040)({ 2026-03-13T01:14:36.757171096Z KubeConfig: (string) "", 2026-03-13T01:14:36.757171096Z KubeClient: (kubernetes.Interface) , 2026-03-13T01:14:36.757171096Z Revision: (string) (len=1) "1", 2026-03-13T01:14:36.757171096Z NodeName: (string) "", 2026-03-13T01:14:36.757171096Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-13T01:14:36.757171096Z Clock: (clock.RealClock) { 2026-03-13T01:14:36.757171096Z }, 2026-03-13T01:14:36.757171096Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-13T01:14:36.757171096Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-13T01:14:36.757171096Z (string) (len=11) "etcd-client", 2026-03-13T01:14:36.757171096Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-13T01:14:36.757171096Z (string) (len=31) "localhost-recovery-client-token" 2026-03-13T01:14:36.757171096Z }, 2026-03-13T01:14:36.757171096Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-13T01:14:36.757171096Z (string) (len=17) "encryption-config", 2026-03-13T01:14:36.757171096Z (string) (len=21) "webhook-authenticator" 2026-03-13T01:14:36.757171096Z }, 2026-03-13T01:14:36.757171096Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-13T01:14:36.757171096Z (string) (len=18) "kube-apiserver-pod", 2026-03-13T01:14:36.757171096Z (string) (len=6) "config", 2026-03-13T01:14:36.757171096Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-13T01:14:36.757171096Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-13T01:14:36.757171096Z (string) (len=15) "etcd-serving-ca", 2026-03-13T01:14:36.757171096Z (string) (len=18) "kubelet-serving-ca", 2026-03-13T01:14:36.757171096Z (string) (len=22) "sa-token-signing-certs", 2026-03-13T01:14:36.757171096Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-13T01:14:36.757171096Z }, 2026-03-13T01:14:36.757171096Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-13T01:14:36.757171096Z (string) (len=14) "oauth-metadata", 2026-03-13T01:14:36.757171096Z (string) (len=12) "cloud-config", 2026-03-13T01:14:36.757171096Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-13T01:14:36.757171096Z }, 2026-03-13T01:14:36.757171096Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-13T01:14:36.757171096Z (string) (len=17) "aggregator-client", 2026-03-13T01:14:36.757171096Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-13T01:14:36.757171096Z (string) (len=31) "service-network-serving-certkey", 2026-03-13T01:14:36.757171096Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-13T01:14:36.757171096Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-13T01:14:36.757171096Z (string) (len=33) "bound-service-account-signing-key", 2026-03-13T01:14:36.757171096Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-13T01:14:36.757171096Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-13T01:14:36.757171096Z (string) (len=14) "kubelet-client", 2026-03-13T01:14:36.757171096Z (string) (len=16) "node-kubeconfigs" 2026-03-13T01:14:36.757171096Z }, 2026-03-13T01:14:36.757171096Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-13T01:14:36.757171096Z (string) (len=17) "user-serving-cert", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-000", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-001", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-002", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-003", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-004", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-005", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-006", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-007", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-008", 2026-03-13T01:14:36.757171096Z (string) (len=21) "user-serving-cert-009" 2026-03-13T01:14:36.757171096Z }, 2026-03-13T01:14:36.757171096Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-13T01:14:36.757171096Z (string) (len=20) "aggregator-client-ca", 2026-03-13T01:14:36.757171096Z (string) (len=9) "client-ca", 2026-03-13T01:14:36.757171096Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-13T01:14:36.757171096Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-13T01:14:36.757171096Z }, 2026-03-13T01:14:36.757171096Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:14:36.757171096Z (string) (len=17) "trusted-ca-bundle" 2026-03-13T01:14:36.757171096Z }, 2026-03-13T01:14:36.757171096Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-13T01:14:36.757171096Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T01:14:36.757171096Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T01:14:36.757171096Z Timeout: (time.Duration) 2m0s, 2026-03-13T01:14:36.757171096Z StaticPodManifestsLockFile: (string) "", 2026-03-13T01:14:36.757171096Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T01:14:36.757171096Z KubeletVersion: (string) "" 2026-03-13T01:14:36.757171096Z }) 2026-03-13T01:14:36.762073308Z I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T01:14:36.766594209Z I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T01:14:36.766645010Z I0313 01:14:36.766617 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:14:36.834378742Z I0313 01:14:36.833816 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:14:36.837370742Z I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T01:15:06.838790310Z I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T01:15:20.843025827Z F0313 01:15:20.842871 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002141615154662741022703 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"47806631-9d60-4658-832d-f160f93f42ea","resourceVersion":"9854","creationTimestamp":"2026-03-13T01:14:25Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.54/23\"],\"mac_address\":\"0a:58:0a:80:00:36\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.54/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.54\"\n ],\n \"mac\": \"0a:58:0a:80:00:36\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"c8e2e6f4-6f49-450a-a752-d04d6d71540c"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-k6d2j"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:16:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:25Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:16:18Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:16:18Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:25Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.54","podIPs":[{"ip":"10.128.0.54"}],"startTime":"2026-03-13T01:14:25Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nI0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nF0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-13T01:14:36Z","finishedAt":"2026-03-13T01:15:20Z","containerID":"cri-o://71b98806c78a21853872bf216fdc04280da7bf4d8777bb06b2a922047a6a9e8c"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://71b98806c78a21853872bf216fdc04280da7bf4d8777bb06b2a922047a6a9e8c","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615154662741035776 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-13T01:11:16.106922938Z I0313 01:11:16.106547 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000007375415154662741032706 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-13T01:18:06.431998974Z I0313 01:18:06.431903 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:06.457363638Z I0313 01:18:06.457301 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:06.563804242Z I0313 01:18:06.563617 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:06.632409986Z I0313 01:18:06.632325 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:06.656971449Z I0313 01:18:06.656909 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:06.765498287Z I0313 01:18:06.765450 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:06.817408505Z I0313 01:18:06.817187 1 cacher.go:1017] cacher (endpointslices.discovery.k8s.io): 3 objects queued in incoming channel. 2026-03-13T01:18:06.817408505Z I0313 01:18:06.817207 1 cacher.go:1017] cacher (endpointslices.discovery.k8s.io): 4 objects queued in incoming channel. 2026-03-13T01:18:06.817449536Z I0313 01:18:06.817421 1 cacher.go:1017] cacher (endpoints): 3 objects queued in incoming channel. 2026-03-13T01:18:06.817449536Z I0313 01:18:06.817435 1 cacher.go:1017] cacher (endpoints): 4 objects queued in incoming channel. 2026-03-13T01:18:06.817449536Z I0313 01:18:06.817442 1 cacher.go:1017] cacher (endpoints): 5 objects queued in incoming channel. 2026-03-13T01:18:06.817449536Z I0313 01:18:06.817446 1 cacher.go:1017] cacher (endpoints): 6 objects queued in incoming channel. 2026-03-13T01:18:06.838857176Z I0313 01:18:06.838772 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:06.850545592Z I0313 01:18:06.848423 1 remote_available_controller.go:416] "changing APIService availability" name="v1.packages.operators.coreos.com" oldStatus="False" newStatus="False" message="failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" reason="FailedDiscoveryCheck" 2026-03-13T01:18:06.854610888Z E0313 01:18:06.854378 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:06.854666900Z W0313 01:18:06.854402 1 handler_proxy.go:100] no RequestInfo found in the context 2026-03-13T01:18:06.854748772Z E0313 01:18:06.854736 1 controller.go:146] "Unhandled Error" err=< 2026-03-13T01:18:06.854748772Z Error updating APIService "v1.packages.operators.coreos.com" with err: failed to download v1.packages.operators.coreos.com: failed to retrieve openAPI spec, http error: ResponseCode: 503, Body: service unavailable 2026-03-13T01:18:06.854748772Z , Header: map[Content-Type:[text/plain; charset=utf-8] X-Content-Type-Options:[nosniff]] 2026-03-13T01:18:06.854748772Z > logger="UnhandledError" 2026-03-13T01:18:06.859087525Z I0313 01:18:06.859047 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:06.861663123Z E0313 01:18:06.861621 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:06.868328277Z E0313 01:18:06.868277 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:06.881384688Z E0313 01:18:06.881325 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:06.930651167Z E0313 01:18:06.930585 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:06.963265380Z I0313 01:18:06.963215 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.043092858Z I0313 01:18:07.043031 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.052000301Z E0313 01:18:07.051864 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:07.060505893Z I0313 01:18:07.060480 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.164008431Z I0313 01:18:07.163931 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.226998068Z E0313 01:18:07.226929 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:07.230015207Z I0313 01:18:07.229902 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.259165810Z I0313 01:18:07.258245 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.364104574Z I0313 01:18:07.363584 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.431611990Z I0313 01:18:07.431482 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.492756809Z I0313 01:18:07.488043 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.563321975Z I0313 01:18:07.563226 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.563510050Z E0313 01:18:07.563469 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:07.630413840Z I0313 01:18:07.630322 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.653275408Z I0313 01:18:07.651174 1 policy_source.go:224] refreshing policies 2026-03-13T01:18:07.657359635Z I0313 01:18:07.657304 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.660062895Z I0313 01:18:07.660007 1 alloc.go:330] "allocated clusterIPs" service="openshift-machine-api/machine-api-operator" clusterIPs={"IPv4":"172.30.223.219"} 2026-03-13T01:18:07.696452827Z I0313 01:18:07.696367 1 alloc.go:330] "allocated clusterIPs" service="openshift-machine-api/machine-api-controllers" clusterIPs={"IPv4":"172.30.116.173"} 2026-03-13T01:18:07.765865823Z I0313 01:18:07.765786 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.831233112Z I0313 01:18:07.831171 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.863745313Z W0313 01:18:07.856831 1 handler_proxy.go:100] no RequestInfo found in the context 2026-03-13T01:18:07.863745313Z E0313 01:18:07.856863 1 controller.go:113] "Unhandled Error" err="loading OpenAPI spec for \"v1.packages.operators.coreos.com\" failed with: Error, could not get list of group versions for APIService" logger="UnhandledError" 2026-03-13T01:18:07.863745313Z W0313 01:18:07.857019 1 handler_proxy.go:100] no RequestInfo found in the context 2026-03-13T01:18:07.863745313Z E0313 01:18:07.857090 1 controller.go:102] "Unhandled Error" err=< 2026-03-13T01:18:07.863745313Z loading OpenAPI spec for "v1.packages.operators.coreos.com" failed with: failed to download v1.packages.operators.coreos.com: failed to retrieve openAPI spec, http error: ResponseCode: 503, Body: service unavailable 2026-03-13T01:18:07.863745313Z , Header: map[Content-Type:[text/plain; charset=utf-8] X-Content-Type-Options:[nosniff]] 2026-03-13T01:18:07.863745313Z > logger="UnhandledError" 2026-03-13T01:18:07.863745313Z I0313 01:18:07.858936 1 controller.go:126] OpenAPI AggregationController: action for item v1.packages.operators.coreos.com: Rate Limited Requeue. 2026-03-13T01:18:07.863745313Z I0313 01:18:07.858969 1 controller.go:109] OpenAPI AggregationController: action for item v1.packages.operators.coreos.com: Rate Limited Requeue. 2026-03-13T01:18:07.863745313Z I0313 01:18:07.859175 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:07.964295513Z I0313 01:18:07.964245 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.032543098Z I0313 01:18:08.032499 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.057543542Z I0313 01:18:08.057491 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.165013773Z I0313 01:18:08.164591 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.213288995Z E0313 01:18:08.213125 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:08.230186757Z I0313 01:18:08.230134 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.257233575Z I0313 01:18:08.257189 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.364178032Z I0313 01:18:08.364132 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.430647881Z I0313 01:18:08.430538 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.457073932Z I0313 01:18:08.457014 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.563240949Z I0313 01:18:08.563199 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.630960550Z I0313 01:18:08.630895 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.658590052Z I0313 01:18:08.657371 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.763043945Z I0313 01:18:08.762991 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.830587361Z I0313 01:18:08.830517 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.860166495Z I0313 01:18:08.860121 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:08.963471327Z I0313 01:18:08.963422 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.030617362Z I0313 01:18:09.030559 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.057175457Z I0313 01:18:09.057125 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.163346134Z I0313 01:18:09.163278 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.257211959Z I0313 01:18:09.257149 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.364014412Z I0313 01:18:09.363960 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.457380625Z I0313 01:18:09.457328 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.500072981Z E0313 01:18:09.500025 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:09.563953732Z I0313 01:18:09.563901 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.697403892Z I0313 01:18:09.696059 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.763650915Z I0313 01:18:09.763571 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:09.857760107Z I0313 01:18:09.857692 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:10.056610558Z I0313 01:18:10.056546 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:10.257641966Z I0313 01:18:10.257579 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:10.458727206Z I0313 01:18:10.458682 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:10.657726330Z I0313 01:18:10.657649 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:10.694890293Z I0313 01:18:10.694834 1 policy_source.go:224] refreshing policies 2026-03-13T01:18:10.857947527Z I0313 01:18:10.857884 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:11.058712139Z I0313 01:18:11.058593 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:11.256542333Z I0313 01:18:11.256495 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:11.456855542Z I0313 01:18:11.456801 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:11.657307146Z I0313 01:18:11.657261 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:11.704838829Z I0313 01:18:11.704784 1 policy_source.go:224] refreshing policies 2026-03-13T01:18:11.704927721Z I0313 01:18:11.704904 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-13T01:18:11.706898903Z I0313 01:18:11.706875 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from runtime/asm_amd64.s:1695 2026-03-13T01:18:11.857613365Z I0313 01:18:11.857576 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:12.057682898Z I0313 01:18:12.057609 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-13T01:18:12.066517949Z E0313 01:18:12.066460 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.66:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-13T01:18:12.258824579Z I0313 01:18:12.258272 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015154662741031156 0ustar00000000000000002026-03-13T01:11:11.793057119Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000020702215154662741037045 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-mlslx2026-03-13T01:17:54.032006747Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T01:17:54.032006747Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T01:17:54.032006747Z Timeout: (time.Duration) 2m0s, 2026-03-13T01:17:54.032006747Z StaticPodManifestsLockFile: (string) "", 2026-03-13T01:17:54.032006747Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T01:17:54.032006747Z KubeletVersion: (string) "" 2026-03-13T01:17:54.032006747Z }) 2026-03-13T01:17:54.032006747Z I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T01:17:54.032006747Z I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T01:17:54.032006747Z I0313 01:14:36.766617 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:17:54.032006747Z I0313 01:14:36.833816 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:17:54.032006747Z I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T01:17:54.032006747Z I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T01:17:54.032006747Z F0313 01:15:20.842871 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:54.032937071Z I0313 01:17:54.032906 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"438e7346-aa68-4d46-a6b5-6f0a8590d82e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)" to "NodeControllerDegraded: All master nodes are ready" 2026-03-13T01:17:54.033582398Z I0313 01:17:54.033538 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"438e7346-aa68-4d46-a6b5-6f0a8590d82e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' installer errors: installer: ving-cert", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-000", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-001", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-002", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-003", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-004", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-005", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-006", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-007", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-008", 2026-03-13T01:17:54.033582398Z (string) (len=21) "user-serving-cert-009" 2026-03-13T01:17:54.033582398Z }, 2026-03-13T01:17:54.033582398Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-13T01:17:54.033582398Z (string) (len=20) "aggregator-client-ca", 2026-03-13T01:17:54.033582398Z (string) (len=9) "client-ca", 2026-03-13T01:17:54.033582398Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-13T01:17:54.033582398Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-13T01:17:54.033582398Z }, 2026-03-13T01:17:54.033582398Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-13T01:17:54.033582398Z (string) (len=17) "trusted-ca-bundle" 2026-03-13T01:17:54.033582398Z }, 2026-03-13T01:17:54.033582398Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-13T01:17:54.033582398Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-13T01:17:54.033582398Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-13T01:17:54.033582398Z Timeout: (time.Duration) 2m0s, 2026-03-13T01:17:54.033582398Z StaticPodManifestsLockFile: (string) "", 2026-03-13T01:17:54.033582398Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-13T01:17:54.033582398Z KubeletVersion: (string) "" 2026-03-13T01:17:54.033582398Z }) 2026-03-13T01:17:54.033582398Z I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0 2026-03-13T01:17:54.033582398Z I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-13T01:17:54.033582398Z I0313 01:14:36.766617 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:17:54.033582398Z I0313 01:14:36.833816 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:17:54.033582398Z I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-13T01:17:54.033582398Z I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0 2026-03-13T01:17:54.033582398Z F0313 01:15:20.842871 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-13T01:17:54.037920611Z W0313 01:17:54.037868 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-03-13T01:17:54.037920611Z W0313 01:17:54.037901 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-03-13T01:17:54.037920611Z W0313 01:17:54.037906 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-13T01:17:54.068629705Z I0313 01:17:54.068562 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T01:17:54.078313938Z I0313 01:17:54.078254 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:22Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:14Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:45Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:17:54.085050474Z I0313 01:17:54.084973 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:17:54.091553674Z I0313 01:17:54.091110 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"438e7346-aa68-4d46-a6b5-6f0a8590d82e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready" 2026-03-13T01:17:54.332608829Z I0313 01:17:54.332532 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T01:17:54.335494995Z I0313 01:17:54.335459 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:17:54.336170022Z I0313 01:17:54.336132 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:22Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:14Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:45Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:17:54.352441868Z I0313 01:17:54.352313 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"438e7346-aa68-4d46-a6b5-6f0a8590d82e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" 2026-03-13T01:17:54.928302049Z W0313 01:17:54.928182 1 degraded_webhook.go:147] failed to connect to webhook "vprovisioning.kb.io" via service "cluster-baremetal-webhook-service.openshift-machine-api.svc:443": dial tcp 172.30.34.146:443: connect: connection refused 2026-03-13T01:17:55.420621806Z I0313 01:17:55.420476 1 request.go:700] Waited for 1.076643329s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/config 2026-03-13T01:17:56.620457098Z I0313 01:17:56.620397 1 request.go:700] Waited for 1.180392674s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-pod 2026-03-13T01:17:56.931350660Z E0313 01:17:56.931275 1 degraded_webhook.go:68] vprovisioning.kb.io: dial tcp 172.30.34.146:443: connect: connection refused 2026-03-13T01:17:56.944416772Z W0313 01:17:56.944338 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.129.224:8443: connect: connection refused 2026-03-13T01:17:57.882696734Z I0313 01:17:57.882566 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:22Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:14Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:45Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:17:57.883162596Z I0313 01:17:57.883077 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T01:17:57.887697464Z I0313 01:17:57.887396 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:17:57.906190588Z I0313 01:17:57.903068 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"438e7346-aa68-4d46-a6b5-6f0a8590d82e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap/config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/kube-apiserver-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready" 2026-03-13T01:17:57.949342797Z W0313 01:17:57.949231 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.129.224:8443: connect: connection refused 2026-03-13T01:17:59.020100052Z I0313 01:17:59.020041 1 request.go:700] Waited for 1.135680014s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-audit-policies 2026-03-13T01:17:59.996213043Z W0313 01:17:59.996080 1 degraded_webhook.go:147] failed to connect to webhook "controlplanemachineset.machine.openshift.io" via service "control-plane-machine-set-operator.openshift-machine-api.svc:9443": dial tcp 172.30.36.175:9443: connect: connection refused 2026-03-13T01:18:01.001004994Z W0313 01:18:01.000839 1 degraded_webhook.go:147] failed to connect to webhook "controlplanemachineset.machine.openshift.io" via service "control-plane-machine-set-operator.openshift-machine-api.svc:9443": dial tcp 172.30.36.175:9443: connect: connection refused 2026-03-13T01:18:01.684555683Z E0313 01:18:01.682287 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-apiserver), \"assets/kube-apiserver/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services apiserver), \"assets/kube-apiserver/check-endpoints-clusterrole.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterroles.rbac.authorization.k8s.io system:openshift:controller:check-endpoints)]" 2026-03-13T01:18:01.693572319Z I0313 01:18:01.693472 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T01:18:01.696030923Z I0313 01:18:01.695956 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-apiserver)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services apiserver)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/check-endpoints-clusterrole.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterroles.rbac.authorization.k8s.io system:openshift:controller:check-endpoints)\nKubeAPIServerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:22Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:14Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:45Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:18:01.699709230Z I0313 01:18:01.699560 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:18:01.717593437Z I0313 01:18:01.714945 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"438e7346-aa68-4d46-a6b5-6f0a8590d82e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-apiserver)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services apiserver)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/check-endpoints-clusterrole.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterroles.rbac.authorization.k8s.io system:openshift:controller:check-endpoints)\nKubeAPIServerStaticResourcesDegraded: " 2026-03-13T01:18:02.820764811Z I0313 01:18:02.820391 1 request.go:700] Waited for 1.116251906s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/config 2026-03-13T01:18:03.009324113Z W0313 01:18:03.009198 1 degraded_webhook.go:147] failed to connect to webhook "clusterautoscalers.autoscaling.openshift.io" via service "cluster-autoscaler-operator.openshift-machine-api.svc:443": dial tcp 172.30.107.55:443: connect: connection refused 2026-03-13T01:18:03.703981212Z W0313 01:18:03.703900 1 dynamic_operator_client.go:355] .status.conditions["KubeAPIServerStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-03-13T01:18:03.746888384Z I0313 01:18:03.746826 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:18:03.751623968Z I0313 01:18:03.751052 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-13T01:14:22Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-13T01:13:14Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-13T01:13:13Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-13T01:13:45Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-03-13T01:18:03.752249874Z I0313 01:18:03.752213 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T01:18:03.772488494Z I0313 01:18:03.769019 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"438e7346-aa68-4d46-a6b5-6f0a8590d82e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-apiserver)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services apiserver)\nKubeAPIServerStaticResourcesDegraded: \"assets/kube-apiserver/check-endpoints-clusterrole.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterroles.rbac.authorization.k8s.io system:openshift:controller:check-endpoints)\nKubeAPIServerStaticResourcesDegraded: " to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready" 2026-03-13T01:18:04.015254874Z W0313 01:18:04.015187 1 degraded_webhook.go:147] failed to connect to webhook "clusterautoscalers.autoscaling.openshift.io" via service "cluster-autoscaler-operator.openshift-machine-api.svc:443": dial tcp 172.30.107.55:443: connect: connection refused 2026-03-13T01:18:04.819991452Z I0313 01:18:04.819921 1 request.go:700] Waited for 1.064262697s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs 2026-03-13T01:18:06.021115337Z E0313 01:18:06.020367 1 degraded_webhook.go:68] clusterautoscalers.autoscaling.openshift.io: dial tcp 172.30.107.55:443: connect: connection refused 2026-03-13T01:18:06.024460105Z W0313 01:18:06.024376 1 degraded_webhook.go:147] failed to connect to webhook "machineautoscalers.autoscaling.openshift.io" via service "cluster-autoscaler-operator.openshift-machine-api.svc:443": dial tcp 172.30.107.55:443: connect: connection refused 2026-03-13T01:18:07.057527296Z W0313 01:18:07.057466 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.129.224:8443: connect: connection refused 2026-03-13T01:18:08.063865107Z W0313 01:18:08.062063 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.129.224:8443: connect: connection refused 2026-03-13T01:18:09.632300640Z I0313 01:18:09.632234 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"438e7346-aa68-4d46-a6b5-6f0a8590d82e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-1-retry-1-master-0 -n openshift-kube-apiserver because it was missing 2026-03-13T01:18:09.829994651Z I0313 01:18:09.828216 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Pending phase 2026-03-13T01:18:10.102779165Z I0313 01:18:10.102717 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.34) to be completed. 2026-03-13T01:18:10.117678075Z I0313 01:18:10.117603 1 prune_controller.go:277] Nothing to prune 2026-03-13T01:18:10.172304364Z W0313 01:18:10.172238 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.129.224:8443: connect: connection refused 2026-03-13T01:18:11.020678524Z I0313 01:18:11.020610 1 request.go:700] Waited for 1.178634878s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/kube-apiserver-master-0 2026-03-13T01:18:11.176722625Z W0313 01:18:11.176667 1 degraded_webhook.go:147] failed to connect to webhook "alertmanagerconfigs.monitoring.coreos.com" via service "prometheus-operator-admission-webhook.openshift-monitoring.svc:8443": dial tcp 172.30.129.224:8443: connect: connection refused kube-apiserver-operator_previous.log0000640000000000000000000003311515154662741037237 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-mlslx2026-03-13T01:14:26.866507123Z I0313 01:14:26.864872 1 base_controller.go:113] All Installer workers have been terminated 2026-03-13T01:14:26.866507123Z I0313 01:14:26.864879 1 controller_manager.go:54] Installer controller terminated 2026-03-13T01:14:26.866507123Z I0313 01:14:26.864890 1 base_controller.go:181] Shutting down StatusSyncer_kube-apiserver ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.864893 1 base_controller.go:159] All StatusSyncer_kube-apiserver post start hooks have been terminated 2026-03-13T01:14:26.866507123Z I0313 01:14:26.864900 1 base_controller.go:181] Shutting down CertRotationTimeUpgradeableController ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.864956 1 base_controller.go:181] Shutting down kube-apiserver-StaticPodStateFallback ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.864966 1 base_controller.go:181] Shutting down kube-apiserver-StartupMonitorPodCondition ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.864973 1 base_controller.go:181] Shutting down PruneController ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.864980 1 base_controller.go:181] Shutting down kube-apiserver-InstallerState ... 2026-03-13T01:14:26.866507123Z E0313 01:14:26.865005 1 base_controller.go:279] "Unhandled Error" err="kube-apiserver-InstallerState reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-13T01:14:26.866507123Z I0313 01:14:26.865016 1 base_controller.go:181] Shutting down kube-apiserver-RemoveStaleConditions ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.865024 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.865033 1 termination_observer.go:155] Shutting down TerminationObserver 2026-03-13T01:14:26.866507123Z I0313 01:14:26.865043 1 base_controller.go:181] Shutting down EventWatchController ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.865054 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.865062 1 base_controller.go:181] Shutting down SCCReconcileController ... 2026-03-13T01:14:26.866507123Z I0313 01:14:26.865186 1 base_controller.go:181] Shutting down PodSecurityReadinessController ... 2026-03-13T01:14:26.866507123Z E0313 01:14:26.865219 1 termination_observer.go:175] "Unhandled Error" err="key failed with : unable to list pods in \"openshift-kube-apiserver\" namespace: client rate limiter Wait returned an error: context canceled" 2026-03-13T01:14:26.866507123Z I0313 01:14:26.865305 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880566 1 base_controller.go:181] Shutting down webhookSupportabilityController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880595 1 base_controller.go:181] Shutting down GuardController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880607 1 base_controller.go:181] Shutting down KubeletVersionSkewController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880616 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880622 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880645 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880651 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880657 1 controller_manager.go:54] GuardController controller terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880662 1 base_controller.go:123] Shutting down worker of KubeletVersionSkewController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880665 1 base_controller.go:113] All KubeletVersionSkewController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880674 1 base_controller.go:181] Shutting down kube-apiserver-Node ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880686 1 base_controller.go:181] Shutting down kube-apiserver ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880694 1 base_controller.go:123] Shutting down worker of kube-apiserver-Node controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880698 1 base_controller.go:113] All kube-apiserver-Node workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880700 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880702 1 controller_manager.go:54] kube-apiserver-Node controller terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880706 1 base_controller.go:123] Shutting down worker of kube-apiserver controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880712 1 base_controller.go:113] All kube-apiserver workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880727 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880737 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880742 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880761 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880765 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880776 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880782 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880793 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880798 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880804 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880809 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880816 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880823 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880828 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880841 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880845 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880856 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880859 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880867 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880872 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880881 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880888 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880896 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880900 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880909 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880914 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880923 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880926 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880936 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880940 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880947 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880951 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880957 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880961 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880970 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880974 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880982 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880986 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880995 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.880999 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881005 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881009 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881018 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881020 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881026 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881030 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881038 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881040 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881045 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881049 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881057 1 base_controller.go:181] Shutting down BoundSATokenSignerController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881062 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881065 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881075 1 base_controller.go:181] Shutting down NodeKubeconfigController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881082 1 base_controller.go:123] Shutting down worker of NodeKubeconfigController controller ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881086 1 base_controller.go:113] All NodeKubeconfigController workers have been terminated 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881096 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-13T01:14:26.881648809Z I0313 01:14:26.881383 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-13T01:14:26.881749102Z I0313 01:14:26.881430 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-13T01:14:26.881749102Z I0313 01:14:26.881465 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:14:26.881749102Z I0313 01:14:26.881504 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-13T01:14:26.881749102Z W0313 01:14:26.881624 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-mlslx.json0000640000000000000000000001362015154662741030030 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-68bd585b-mlslx","generateName":"kube-apiserver-operator-68bd585b-","namespace":"openshift-kube-apiserver-operator","uid":"b61ae6f3-d8eb-4803-a0bf-8aab29c8bd35","resourceVersion":"9293","creationTimestamp":"2026-03-13T01:11:38Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"68bd585b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-68bd585b","uid":"6134f6df-0de3-4e63-9154-152dca6d856a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:12Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-13T01:13:10Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-13T01:14:35Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T01:13:11Z","finishedAt":"2026-03-13T01:14:26Z","containerID":"cri-o://2703e40a08051a608961078f9b2c331b07b8ffa237b00eb643f4e928fb008663"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://37ec0a7d20e51b2b48319f3f798e03141088e89b283f96688c4513f6cdc84e01","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007432015154662741025213 0ustar00000000000000002026-03-13T01:14:40.066423122Z cluster-etcd-operator rev \ 2026-03-13T01:14:40.066423122Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-13T01:14:40.066423122Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-13T01:14:40.066423122Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-13T01:14:40.066423122Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-13T01:14:40.066423122Z securityContext: 2026-03-13T01:14:40.066423122Z privileged: true 2026-03-13T01:14:40.066423122Z resources: 2026-03-13T01:14:40.066423122Z requests: 2026-03-13T01:14:40.066423122Z memory: 50Mi 2026-03-13T01:14:40.066423122Z cpu: 10m 2026-03-13T01:14:40.066423122Z env: 2026-03-13T01:14:40.066423122Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-13T01:14:40.066423122Z value: "https://192.168.32.10:2379" 2026-03-13T01:14:40.066423122Z - name: "ETCDCTL_API" 2026-03-13T01:14:40.066423122Z value: "3" 2026-03-13T01:14:40.066423122Z - name: "ETCDCTL_CACERT" 2026-03-13T01:14:40.066423122Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-13T01:14:40.066423122Z - name: "ETCDCTL_CERT" 2026-03-13T01:14:40.066423122Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-13T01:14:40.066423122Z - name: "ETCDCTL_ENDPOINTS" 2026-03-13T01:14:40.066423122Z value: "https://192.168.32.10:2379" 2026-03-13T01:14:40.066423122Z - name: "ETCDCTL_KEY" 2026-03-13T01:14:40.066423122Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-13T01:14:40.066423122Z - name: "ETCD_CIPHER_SUITES" 2026-03-13T01:14:40.066423122Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-13T01:14:40.066423122Z - name: "ETCD_DATA_DIR" 2026-03-13T01:14:40.066423122Z value: "/var/lib/etcd" 2026-03-13T01:14:40.066423122Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-13T01:14:40.066423122Z value: "2500" 2026-03-13T01:14:40.066423122Z - name: "ETCD_ENABLE_PPROF" 2026-03-13T01:14:40.066423122Z value: "true" 2026-03-13T01:14:40.066423122Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-13T01:14:40.066423122Z value: "1" 2026-03-13T01:14:40.066423122Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-13T01:14:40.066524085Z value: "200ms" 2026-03-13T01:14:40.066524085Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-13T01:14:40.066524085Z value: "5s" 2026-03-13T01:14:40.066524085Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-13T01:14:40.066524085Z value: "500" 2026-03-13T01:14:40.066524085Z - name: "ETCD_IMAGE" 2026-03-13T01:14:40.066524085Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b" 2026-03-13T01:14:40.066524085Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-13T01:14:40.066524085Z value: "existing" 2026-03-13T01:14:40.066524085Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-13T01:14:40.066524085Z value: "8589934592" 2026-03-13T01:14:40.066524085Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-13T01:14:40.066524085Z value: "true" 2026-03-13T01:14:40.066524085Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-13T01:14:40.066524085Z value: "TLS1.2" 2026-03-13T01:14:40.066524085Z - name: "NODE_master_0_ETCD_NAME" 2026-03-13T01:14:40.066524085Z value: "master-0" 2026-03-13T01:14:40.066524085Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-13T01:14:40.066524085Z value: "192.168.32.10" 2026-03-13T01:14:40.066524085Z - name: "NODE_master_0_IP" 2026-03-13T01:14:40.066524085Z value: "192.168.32.10" 2026-03-13T01:14:40.066524085Z volumeMounts: 2026-03-13T01:14:40.066524085Z - mountPath: /var/lib/etcd 2026-03-13T01:14:40.066524085Z name: data-dir 2026-03-13T01:14:40.066524085Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-13T01:14:40.066524085Z name: cert-dir 2026-03-13T01:14:40.066524085Z hostNetwork: true 2026-03-13T01:14:40.066524085Z priority: 2000001000 2026-03-13T01:14:40.066524085Z priorityClassName: system-node-critical 2026-03-13T01:14:40.066524085Z tolerations: 2026-03-13T01:14:40.066524085Z - operator: "Exists" 2026-03-13T01:14:40.066524085Z volumes: 2026-03-13T01:14:40.066524085Z - hostPath: 2026-03-13T01:14:40.066524085Z path: /etc/kubernetes/manifests 2026-03-13T01:14:40.066524085Z name: static-pod-dir 2026-03-13T01:14:40.066524085Z - hostPath: 2026-03-13T01:14:40.066524085Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-13T01:14:40.066524085Z name: resource-dir 2026-03-13T01:14:40.066524085Z - hostPath: 2026-03-13T01:14:40.066524085Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-13T01:14:40.066524085Z name: cert-dir 2026-03-13T01:14:40.066524085Z - hostPath: 2026-03-13T01:14:40.066524085Z path: /var/lib/etcd 2026-03-13T01:14:40.066524085Z type: "" 2026-03-13T01:14:40.066524085Z name: data-dir 2026-03-13T01:14:40.066524085Z - hostPath: 2026-03-13T01:14:40.066524085Z path: /usr/local/bin 2026-03-13T01:14:40.066524085Z name: usr-local-bin 2026-03-13T01:14:40.066524085Z - hostPath: 2026-03-13T01:14:40.066524085Z path: /var/log/etcd 2026-03-13T01:14:40.066524085Z name: log-dir 2026-03-13T01:14:40.066524085Z - hostPath: 2026-03-13T01:14:40.066524085Z path: /etc/kubernetes 2026-03-13T01:14:40.066524085Z name: config-dir 2026-03-13T01:14:40.066524085Z - hostPath: 2026-03-13T01:14:40.066524085Z path: /var/lib/etcd-auto-backup 2026-03-13T01:14:40.066524085Z name: etcd-auto-backup-dir 2026-03-13T01:14:40.072782563Z I0313 01:14:40.072694 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-13T01:14:40.073009989Z I0313 01:14:40.072996 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-13T01:14:40.073052960Z I0313 01:14:40.073028 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-13T01:14:40.073052960Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-13T01:14:54.264714796Z W0313 01:14:54.264402 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189c4199540e9fc2.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:36b2d6ee-3ae7-444b-b327-f024a8a06ab7,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-03-13 01:14:40.073179074 +0000 UTC m=+30.841711807,LastTimestamp:2026-03-13 01:14:40.073179074 +0000 UTC m=+30.841711807,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/events?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615154662741023507 0ustar00000000000000002026-03-13T01:17:17.624034978Z I0313 01:17:17.623770 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215154662741024204 0ustar00000000000000002026-03-13T01:17:07.313729694Z I0313 01:17:07.313472 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-13T01:17:43.154287523Z I0313 01:17:43.154161 1 etcdcli_pool.go:70] creating a new cached client 2026-03-13T01:17:48.161457999Z I0313 01:17:48.161396 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615154662741024363 0ustar00000000000000002026-03-13T01:17:06.914509821Z {"level":"info","ts":"2026-03-13T01:17:06.914262Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-13T01:17:06.916971568Z {"level":"info","ts":"2026-03-13T01:17:06.916820Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-13T01:17:06.917534213Z {"level":"info","ts":"2026-03-13T01:17:06.917473Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-13T01:17:06.917694908Z {"level":"info","ts":"2026-03-13T01:17:06.917595Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-13T01:17:06.917744089Z {"level":"info","ts":"2026-03-13T01:17:06.917712Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc0000bc000/192.168.32.10:9978\""} 2026-03-13T01:17:06.917830931Z {"level":"info","ts":"2026-03-13T01:17:06.917786Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc0000bc000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-13T01:17:06.917830931Z {"level":"info","ts":"2026-03-13T01:17:06.917812Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-13T01:17:06.918322745Z {"level":"info","ts":"2026-03-13T01:17:06.918254Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-13T01:17:06.918421547Z {"level":"info","ts":"2026-03-13T01:17:06.918355Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-13T01:17:06.918518210Z {"level":"info","ts":"2026-03-13T01:17:06.918470Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc00038a5a0 } }"} 2026-03-13T01:17:06.918534520Z {"level":"info","ts":"2026-03-13T01:17:06.918514Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-13T01:17:06.918587152Z {"level":"info","ts":"2026-03-13T01:17:06.918556Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-13T01:17:06.918619813Z {"level":"info","ts":"2026-03-13T01:17:06.918581Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-13T01:17:06.918840839Z {"level":"info","ts":"2026-03-13T01:17:06.918732Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T01:17:06.918866999Z {"level":"info","ts":"2026-03-13T01:17:06.918844Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T01:17:06.918982732Z {"level":"info","ts":"2026-03-13T01:17:06.918912Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, CONNECTING"} 2026-03-13T01:17:06.919523257Z {"level":"info","ts":"2026-03-13T01:17:06.919452Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:06.919576369Z {"level":"warn","ts":"2026-03-13T01:17:06.919523Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:06.919623880Z {"level":"info","ts":"2026-03-13T01:17:06.919589Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:06.919727373Z {"level":"info","ts":"2026-03-13T01:17:06.919681Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, TRANSIENT_FAILURE"} 2026-03-13T01:17:06.919749703Z {"level":"info","ts":"2026-03-13T01:17:06.919720Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-13T01:17:06.920168135Z {"level":"info","ts":"2026-03-13T01:17:06.920092Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-13T01:17:06.920249217Z {"level":"info","ts":"2026-03-13T01:17:06.920204Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-13T01:17:06.920729570Z {"level":"info","ts":"2026-03-13T01:17:06.920685Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-13T01:17:06.920752590Z {"level":"info","ts":"2026-03-13T01:17:06.920717Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-13T01:17:06.920752590Z {"level":"info","ts":"2026-03-13T01:17:06.920732Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-13T01:17:06.920768841Z {"level":"info","ts":"2026-03-13T01:17:06.920744Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-13T01:17:06.921043738Z {"level":"info","ts":"2026-03-13T01:17:06.920993Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-13T01:17:07.920281588Z {"level":"info","ts":"2026-03-13T01:17:07.920107Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:07.920356120Z {"level":"info","ts":"2026-03-13T01:17:07.920285Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, IDLE"} 2026-03-13T01:17:07.920519754Z {"level":"info","ts":"2026-03-13T01:17:07.920417Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T01:17:07.920519754Z {"level":"info","ts":"2026-03-13T01:17:07.920491Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T01:17:07.920687308Z {"level":"info","ts":"2026-03-13T01:17:07.920543Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, CONNECTING"} 2026-03-13T01:17:07.921032818Z {"level":"info","ts":"2026-03-13T01:17:07.920945Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:07.921032818Z {"level":"warn","ts":"2026-03-13T01:17:07.920995Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:07.921062349Z {"level":"info","ts":"2026-03-13T01:17:07.921032Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:07.921082139Z {"level":"info","ts":"2026-03-13T01:17:07.921058Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, TRANSIENT_FAILURE"} 2026-03-13T01:17:09.773133625Z {"level":"info","ts":"2026-03-13T01:17:09.772975Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:09.773133625Z {"level":"info","ts":"2026-03-13T01:17:09.773039Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, IDLE"} 2026-03-13T01:17:09.773133625Z {"level":"info","ts":"2026-03-13T01:17:09.773068Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T01:17:09.773133625Z {"level":"info","ts":"2026-03-13T01:17:09.773093Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T01:17:09.773338940Z {"level":"info","ts":"2026-03-13T01:17:09.773231Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, CONNECTING"} 2026-03-13T01:17:09.773506395Z {"level":"info","ts":"2026-03-13T01:17:09.773419Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:09.773506395Z {"level":"warn","ts":"2026-03-13T01:17:09.773466Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:09.773561996Z {"level":"info","ts":"2026-03-13T01:17:09.773500Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:09.773561996Z {"level":"info","ts":"2026-03-13T01:17:09.773536Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, TRANSIENT_FAILURE"} 2026-03-13T01:17:12.297371379Z {"level":"info","ts":"2026-03-13T01:17:12.297227Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:12.297371379Z {"level":"info","ts":"2026-03-13T01:17:12.297317Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, IDLE"} 2026-03-13T01:17:12.297448951Z {"level":"info","ts":"2026-03-13T01:17:12.297376Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T01:17:12.297448951Z {"level":"info","ts":"2026-03-13T01:17:12.297433Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T01:17:12.297673117Z {"level":"info","ts":"2026-03-13T01:17:12.297584Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, CONNECTING"} 2026-03-13T01:17:12.297935475Z {"level":"info","ts":"2026-03-13T01:17:12.297864Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:12.297935475Z {"level":"warn","ts":"2026-03-13T01:17:12.297914Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:12.297981786Z {"level":"info","ts":"2026-03-13T01:17:12.297950Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:12.298098569Z {"level":"info","ts":"2026-03-13T01:17:12.298029Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, TRANSIENT_FAILURE"} 2026-03-13T01:17:16.917790527Z {"level":"info","ts":"2026-03-13T01:17:16.917599Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-13T01:17:16.917790527Z {"level":"info","ts":"2026-03-13T01:17:16.917720Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, IDLE"} 2026-03-13T01:17:16.917917480Z {"level":"info","ts":"2026-03-13T01:17:16.917769Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-13T01:17:16.917917480Z {"level":"info","ts":"2026-03-13T01:17:16.917817Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-13T01:17:16.918044083Z {"level":"info","ts":"2026-03-13T01:17:16.917953Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, CONNECTING"} 2026-03-13T01:17:16.927899430Z {"level":"info","ts":"2026-03-13T01:17:16.927823Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-13T01:17:16.927899430Z {"level":"info","ts":"2026-03-13T01:17:16.927868Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00061b410, READY"} 2026-03-13T01:17:16.927939601Z {"level":"info","ts":"2026-03-13T01:17:16.927914Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-13T01:17:16.927960122Z {"level":"info","ts":"2026-03-13T01:17:16.927945Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000011735515154662741022727 0ustar00000000000000002026-03-13T01:17:13.978521731Z {"level":"info","ts":"2026-03-13T01:17:13.978495Z","caller":"fileutil/purge.go:50","msg":"started to purge file","dir":"/var/lib/etcd/member/wal","suffix":"wal","max":5,"interval":"30s"} 2026-03-13T01:17:13.978845760Z {"level":"info","ts":"2026-03-13T01:17:13.978769Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 switched to configuration voters=(10514648578690414096)"} 2026-03-13T01:17:13.978950123Z {"level":"info","ts":"2026-03-13T01:17:13.978890Z","caller":"membership/cluster.go:421","msg":"added member","cluster-id":"a3c29fbf00fc418e","local-member-id":"91eb892c5ee87610","added-peer-id":"91eb892c5ee87610","added-peer-peer-urls":["https://192.168.32.10:2380"],"added-peer-is-learner":false} 2026-03-13T01:17:13.979033275Z {"level":"info","ts":"2026-03-13T01:17:13.978977Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} 2026-03-13T01:17:13.979033275Z {"level":"info","ts":"2026-03-13T01:17:13.979007Z","caller":"membership/cluster.go:587","msg":"set initial cluster version","cluster-id":"a3c29fbf00fc418e","local-member-id":"91eb892c5ee87610","cluster-version":"3.5"} 2026-03-13T01:17:13.979084586Z {"level":"info","ts":"2026-03-13T01:17:13.979050Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} 2026-03-13T01:17:13.981933713Z {"level":"info","ts":"2026-03-13T01:17:13.981842Z","caller":"embed/etcd.go:765","msg":"starting with client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = true, crl-file = ","cipher-suites":["TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"]} 2026-03-13T01:17:13.982089918Z {"level":"info","ts":"2026-03-13T01:17:13.981985Z","caller":"embed/etcd.go:636","msg":"serving peer traffic","address":"[::]:2380"} 2026-03-13T01:17:13.982089918Z {"level":"info","ts":"2026-03-13T01:17:13.982057Z","caller":"embed/etcd.go:606","msg":"cmux::serve","address":"[::]:2380"} 2026-03-13T01:17:13.982889529Z {"level":"info","ts":"2026-03-13T01:17:13.982801Z","caller":"embed/etcd.go:294","msg":"now serving peer/client/metrics","local-member-id":"91eb892c5ee87610","initial-advertise-peer-urls":["https://192.168.32.10:2380"],"listen-peer-urls":["https://0.0.0.0:2380"],"advertise-client-urls":["https://192.168.32.10:2379"],"listen-client-urls":["https://0.0.0.0:2379","unixs://192.168.32.10:0"],"listen-metrics-urls":["https://0.0.0.0:9978"]} 2026-03-13T01:17:13.982914030Z {"level":"info","ts":"2026-03-13T01:17:13.982894Z","caller":"embed/etcd.go:911","msg":"serving metrics","address":"https://0.0.0.0:9978"} 2026-03-13T01:17:14.037322112Z {"level":"info","ts":"2026-03-13T01:17:14.037132Z","caller":"etcdserver/server.go:1482","msg":"triggering snapshot","local-member-id":"91eb892c5ee87610","local-member-applied-index":10068,"local-member-snapshot-index":0,"local-member-snapshot-count":10000} 2026-03-13T01:17:14.045838963Z {"level":"info","ts":"2026-03-13T01:17:14.045699Z","caller":"etcdserver/server.go:2503","msg":"saved snapshot","snapshot-index":10068} 2026-03-13T01:17:14.045884534Z {"level":"info","ts":"2026-03-13T01:17:14.045845Z","caller":"etcdserver/server.go:2533","msg":"compacted Raft logs","compact-index":5068} 2026-03-13T01:17:18.422701629Z {"level":"info","ts":"2026-03-13T01:17:18.422399Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 is starting a new election at term 3"} 2026-03-13T01:17:18.422701629Z {"level":"info","ts":"2026-03-13T01:17:18.422584Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 became pre-candidate at term 3"} 2026-03-13T01:17:18.422701629Z {"level":"info","ts":"2026-03-13T01:17:18.422612Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 received MsgPreVoteResp from 91eb892c5ee87610 at term 3"} 2026-03-13T01:17:18.422789682Z {"level":"info","ts":"2026-03-13T01:17:18.422706Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 became candidate at term 4"} 2026-03-13T01:17:18.422811122Z {"level":"info","ts":"2026-03-13T01:17:18.422786Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 received MsgVoteResp from 91eb892c5ee87610 at term 4"} 2026-03-13T01:17:18.422827533Z {"level":"info","ts":"2026-03-13T01:17:18.422806Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 became leader at term 4"} 2026-03-13T01:17:18.422845273Z {"level":"info","ts":"2026-03-13T01:17:18.422820Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 91eb892c5ee87610 elected leader 91eb892c5ee87610 at term 4"} 2026-03-13T01:17:18.427072378Z {"level":"info","ts":"2026-03-13T01:17:18.426944Z","caller":"etcdserver/server.go:2150","msg":"published local member to cluster through raft","local-member-id":"91eb892c5ee87610","local-member-attributes":"{Name:master-0 ClientURLs:[https://192.168.32.10:2379]}","request-path":"/0/members/91eb892c5ee87610/attributes","cluster-id":"a3c29fbf00fc418e","publish-timeout":"30s"} 2026-03-13T01:17:18.427072378Z {"level":"info","ts":"2026-03-13T01:17:18.427014Z","caller":"embed/serve.go:124","msg":"ready to serve client requests"} 2026-03-13T01:17:18.427206201Z {"level":"info","ts":"2026-03-13T01:17:18.427144Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-13T01:17:18.427206201Z {"level":"info","ts":"2026-03-13T01:17:18.427172Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-13T01:17:18.427610382Z {"level":"info","ts":"2026-03-13T01:17:18.427546Z","caller":"embed/serve.go:124","msg":"ready to serve client requests"} 2026-03-13T01:17:18.428397203Z {"level":"info","ts":"2026-03-13T01:17:18.428300Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} 2026-03-13T01:17:18.428397203Z {"level":"info","ts":"2026-03-13T01:17:18.428351Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} 2026-03-13T01:17:18.430972853Z {"level":"info","ts":"2026-03-13T01:17:18.430868Z","caller":"embed/serve.go:275","msg":"serving client traffic securely","traffic":"grpc+http","address":"[::]:2379"} 2026-03-13T01:17:18.434905070Z {"level":"info","ts":"2026-03-13T01:17:18.434779Z","caller":"embed/serve.go:275","msg":"serving client traffic securely","traffic":"grpc+http","address":"192.168.32.10:0"} 2026-03-13T01:17:49.195872815Z {"level":"info","ts":"2026-03-13T01:17:49.190928Z","caller":"traceutil/trace.go:171","msg":"trace[1578869261] transaction","detail":"{read_only:false; number_of_response:1; response_revision:9937; }","duration":"218.368062ms","start":"2026-03-13T01:17:48.972526Z","end":"2026-03-13T01:17:49.190894Z","steps":["trace[1578869261] 'process raft request' (duration: 69.95334ms)","trace[1578869261] 'compare' (duration: 148.193136ms)"],"step_count":2} 2026-03-13T01:17:49.338661790Z {"level":"info","ts":"2026-03-13T01:17:49.338493Z","caller":"traceutil/trace.go:171","msg":"trace[1616919077] transaction","detail":"{read_only:false; response_revision:9938; number_of_response:1; }","duration":"136.4949ms","start":"2026-03-13T01:17:49.201972Z","end":"2026-03-13T01:17:49.338467Z","steps":["trace[1616919077] 'process raft request' (duration: 93.452034ms)","trace[1616919077] 'compare' (duration: 42.331157ms)"],"step_count":2} 2026-03-13T01:17:49.541102635Z {"level":"info","ts":"2026-03-13T01:17:49.540814Z","caller":"traceutil/trace.go:171","msg":"trace[1047723223] linearizableReadLoop","detail":"{readStateIndex:10281; appliedIndex:10280; }","duration":"194.95434ms","start":"2026-03-13T01:17:49.345834Z","end":"2026-03-13T01:17:49.540788Z","steps":["trace[1047723223] 'read index received' (duration: 125.871273ms)","trace[1047723223] 'applied index is now lower than readState.Index' (duration: 69.082007ms)"],"step_count":2} 2026-03-13T01:17:49.541102635Z {"level":"info","ts":"2026-03-13T01:17:49.540926Z","caller":"traceutil/trace.go:171","msg":"trace[1810864381] transaction","detail":"{read_only:false; number_of_response:1; response_revision:9939; }","duration":"199.782076ms","start":"2026-03-13T01:17:49.341133Z","end":"2026-03-13T01:17:49.540915Z","steps":["trace[1810864381] 'process raft request' (duration: 130.681649ms)","trace[1810864381] 'compare' (duration: 67.636139ms)"],"step_count":2} 2026-03-13T01:17:49.541102635Z {"level":"info","ts":"2026-03-13T01:17:49.540989Z","caller":"traceutil/trace.go:171","msg":"trace[1373947736] range","detail":"{range_begin:/kubernetes.io/ingress/; range_end:/kubernetes.io/ingress0; response_count:0; response_revision:9939; }","duration":"195.153385ms","start":"2026-03-13T01:17:49.345827Z","end":"2026-03-13T01:17:49.540980Z","steps":["trace[1373947736] 'agreement among raft nodes before linearized reading' (duration: 195.135204ms)"],"step_count":1} 2026-03-13T01:17:49.631524660Z {"level":"info","ts":"2026-03-13T01:17:49.631430Z","caller":"traceutil/trace.go:171","msg":"trace[1680203551] transaction","detail":"{read_only:false; number_of_response:0; response_revision:9939; }","duration":"122.425503ms","start":"2026-03-13T01:17:49.508975Z","end":"2026-03-13T01:17:49.631400Z","steps":["trace[1680203551] 'process raft request' (duration: 122.32244ms)"],"step_count":1} 2026-03-13T01:17:49.632006162Z {"level":"info","ts":"2026-03-13T01:17:49.631955Z","caller":"traceutil/trace.go:171","msg":"trace[2046884106] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:9939; }","duration":"181.454456ms","start":"2026-03-13T01:17:49.450489Z","end":"2026-03-13T01:17:49.631943Z","steps":["trace[2046884106] 'agreement among raft nodes before linearized reading' (duration: 181.404565ms)"],"step_count":1} 2026-03-13T01:17:49.632277630Z {"level":"info","ts":"2026-03-13T01:17:49.632233Z","caller":"traceutil/trace.go:171","msg":"trace[1543161987] range","detail":"{range_begin:/kubernetes.io/csistoragecapacities/; range_end:/kubernetes.io/csistoragecapacities0; response_count:0; response_revision:9939; }","duration":"194.707583ms","start":"2026-03-13T01:17:49.437516Z","end":"2026-03-13T01:17:49.632223Z","steps":["trace[1543161987] 'agreement among raft nodes before linearized reading' (duration: 194.688293ms)"],"step_count":1} 2026-03-13T01:17:49.632662240Z {"level":"warn","ts":"2026-03-13T01:17:49.632567Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"205.998128ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/builds/cluster\" ","response":"range_response_count:1 size:1371"} 2026-03-13T01:17:49.632693100Z {"level":"info","ts":"2026-03-13T01:17:49.632622Z","caller":"traceutil/trace.go:171","msg":"trace[930964294] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/builds/cluster; range_end:; response_count:1; response_revision:9939; }","duration":"206.0953ms","start":"2026-03-13T01:17:49.426516Z","end":"2026-03-13T01:17:49.632611Z","steps":["trace[930964294] 'agreement among raft nodes before linearized reading' (duration: 205.976987ms)"],"step_count":1} 2026-03-13T01:17:49.632823914Z {"level":"warn","ts":"2026-03-13T01:17:49.632781Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"206.267435ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/builds/\" range_end:\"/kubernetes.io/config.openshift.io/builds0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-03-13T01:17:49.632823914Z {"level":"info","ts":"2026-03-13T01:17:49.632806Z","caller":"traceutil/trace.go:171","msg":"trace[732784000] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/builds/; range_end:/kubernetes.io/config.openshift.io/builds0; response_count:0; response_revision:9939; }","duration":"206.327676ms","start":"2026-03-13T01:17:49.426472Z","end":"2026-03-13T01:17:49.632800Z","steps":["trace[732784000] 'agreement among raft nodes before linearized reading' (duration: 206.288185ms)"],"step_count":1} 2026-03-13T01:17:49.632979748Z {"level":"warn","ts":"2026-03-13T01:17:49.632918Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"282.702094ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/\" range_end:\"/kubernetes.io/machineconfiguration.openshift.io/machineconfigs0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-03-13T01:17:49.632979748Z {"level":"info","ts":"2026-03-13T01:17:49.632943Z","caller":"traceutil/trace.go:171","msg":"trace[61188155] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/; range_end:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs0; response_count:0; response_revision:9939; }","duration":"282.758616ms","start":"2026-03-13T01:17:49.350177Z","end":"2026-03-13T01:17:49.632936Z","steps":["trace[61188155] 'agreement among raft nodes before linearized reading' (duration: 282.717105ms)"],"step_count":1} 2026-03-13T01:17:49.867006049Z {"level":"info","ts":"2026-03-13T01:17:49.866908Z","caller":"traceutil/trace.go:171","msg":"trace[1346094544] transaction","detail":"{read_only:false; number_of_response:0; response_revision:9939; }","duration":"158.124776ms","start":"2026-03-13T01:17:49.708759Z","end":"2026-03-13T01:17:49.866883Z","steps":["trace[1346094544] 'process raft request' (duration: 78.00291ms)","trace[1346094544] 'compare' (duration: 80.065584ms)"],"step_count":2} 2026-03-13T01:17:49.867294007Z {"level":"info","ts":"2026-03-13T01:17:49.866904Z","caller":"traceutil/trace.go:171","msg":"trace[2143924989] linearizableReadLoop","detail":"{readStateIndex:10283; appliedIndex:10282; }","duration":"101.978558ms","start":"2026-03-13T01:17:49.764901Z","end":"2026-03-13T01:17:49.866879Z","steps":["trace[2143924989] 'read index received' (duration: 21.860942ms)","trace[2143924989] 'applied index is now lower than readState.Index' (duration: 80.116736ms)"],"step_count":2} 2026-03-13T01:17:49.867357958Z {"level":"info","ts":"2026-03-13T01:17:49.867012Z","caller":"traceutil/trace.go:171","msg":"trace[2055569155] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/ingresscontrollers/; range_end:/kubernetes.io/operator.openshift.io/ingresscontrollers0; response_count:0; response_revision:9939; }","duration":"102.159892ms","start":"2026-03-13T01:17:49.764841Z","end":"2026-03-13T01:17:49.867001Z","steps":["trace[2055569155] 'agreement among raft nodes before linearized reading' (duration: 102.132091ms)"],"step_count":1} 2026-03-13T01:17:56.349135362Z {"level":"info","ts":"2026-03-13T01:17:56.349005Z","caller":"traceutil/trace.go:171","msg":"trace[1221261100] linearizableReadLoop","detail":"{readStateIndex:10665; appliedIndex:10664; }","duration":"121.978371ms","start":"2026-03-13T01:17:56.227007Z","end":"2026-03-13T01:17:56.348985Z","steps":["trace[1221261100] 'read index received' (duration: 120.529353ms)","trace[1221261100] 'applied index is now lower than readState.Index' (duration: 1.448228ms)"],"step_count":2} 2026-03-13T01:17:56.349208234Z {"level":"info","ts":"2026-03-13T01:17:56.349151Z","caller":"traceutil/trace.go:171","msg":"trace[954757576] range","detail":"{range_begin:/kubernetes.io/pods/openshift-kube-apiserver/kube-apiserver-master-0; range_end:; response_count:0; response_revision:10271; }","duration":"117.576165ms","start":"2026-03-13T01:17:56.231564Z","end":"2026-03-13T01:17:56.349140Z","steps":["trace[954757576] 'agreement among raft nodes before linearized reading' (duration: 117.558694ms)"],"step_count":1} 2026-03-13T01:17:56.349208234Z {"level":"info","ts":"2026-03-13T01:17:56.349137Z","caller":"traceutil/trace.go:171","msg":"trace[1909743120] transaction","detail":"{read_only:false; response_revision:10271; number_of_response:1; }","duration":"133.780339ms","start":"2026-03-13T01:17:56.215333Z","end":"2026-03-13T01:17:56.349113Z","steps":["trace[1909743120] 'process raft request' (duration: 132.27901ms)"],"step_count":1} 2026-03-13T01:17:56.349226374Z {"level":"info","ts":"2026-03-13T01:17:56.349172Z","caller":"traceutil/trace.go:171","msg":"trace[713760686] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:etcd-operator; range_end:; response_count:1; response_revision:10271; }","duration":"122.173665ms","start":"2026-03-13T01:17:56.226979Z","end":"2026-03-13T01:17:56.349153Z","steps":["trace[713760686] 'agreement among raft nodes before linearized reading' (duration: 122.120574ms)"],"step_count":1} 2026-03-13T01:17:56.353539287Z {"level":"info","ts":"2026-03-13T01:17:56.349910Z","caller":"traceutil/trace.go:171","msg":"trace[1857935872] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-controller-manager-operator/openshift-controller-manager-operator-config; range_end:; response_count:1; response_revision:10271; }","duration":"101.215428ms","start":"2026-03-13T01:17:56.248676Z","end":"2026-03-13T01:17:56.349891Z","steps":["trace[1857935872] 'agreement among raft nodes before linearized reading' (duration: 101.180637ms)"],"step_count":1} 2026-03-13T01:18:07.479333808Z {"level":"info","ts":"2026-03-13T01:18:07.478926Z","caller":"traceutil/trace.go:171","msg":"trace[2727003] transaction","detail":"{read_only:false; response_revision:10525; number_of_response:1; }","duration":"169.975416ms","start":"2026-03-13T01:18:07.308935Z","end":"2026-03-13T01:18:07.478911Z","steps":["trace[2727003] 'process raft request' (duration: 169.934765ms)"],"step_count":1} 2026-03-13T01:18:07.479333808Z {"level":"info","ts":"2026-03-13T01:18:07.479090Z","caller":"traceutil/trace.go:171","msg":"trace[2083147073] linearizableReadLoop","detail":"{readStateIndex:10936; appliedIndex:10935; }","duration":"229.288077ms","start":"2026-03-13T01:18:07.249772Z","end":"2026-03-13T01:18:07.479060Z","steps":["trace[2083147073] 'read index received' (duration: 227.004077ms)","trace[2083147073] 'applied index is now lower than readState.Index' (duration: 2.28147ms)"],"step_count":2} 2026-03-13T01:18:07.479333808Z {"level":"warn","ts":"2026-03-13T01:18:07.479255Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"229.477932ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/cluster-autoscaler-operator\" ","response":"range_response_count:1 size:1373"} 2026-03-13T01:18:07.479333808Z {"level":"info","ts":"2026-03-13T01:18:07.479285Z","caller":"traceutil/trace.go:171","msg":"trace[619238424] range","detail":"{range_begin:/kubernetes.io/clusterroles/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:10525; }","duration":"229.542074ms","start":"2026-03-13T01:18:07.249734Z","end":"2026-03-13T01:18:07.479276Z","steps":["trace[619238424] 'agreement among raft nodes before linearized reading' (duration: 229.467472ms)"],"step_count":1} 2026-03-13T01:18:07.479458171Z {"level":"warn","ts":"2026-03-13T01:18:07.479413Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"228.967429ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-controller-manager/prometheus-k8s\" ","response":"range_response_count:1 size:1080"} 2026-03-13T01:18:07.479494202Z {"level":"info","ts":"2026-03-13T01:18:07.479463Z","caller":"traceutil/trace.go:171","msg":"trace[2061209087] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-controller-manager/prometheus-k8s; range_end:; response_count:1; response_revision:10525; }","duration":"229.03808ms","start":"2026-03-13T01:18:07.250411Z","end":"2026-03-13T01:18:07.479449Z","steps":["trace[2061209087] 'agreement among raft nodes before linearized reading' (duration: 228.923567ms)"],"step_count":1} 2026-03-13T01:18:07.479613186Z {"level":"info","ts":"2026-03-13T01:18:07.479579Z","caller":"traceutil/trace.go:171","msg":"trace[372350525] range","detail":"{range_begin:/kubernetes.io/clusterroles/machine-api-controllers; range_end:; response_count:1; response_revision:10525; }","duration":"186.496988ms","start":"2026-03-13T01:18:07.293074Z","end":"2026-03-13T01:18:07.479571Z","steps":["trace[372350525] 'agreement among raft nodes before linearized reading' (duration: 186.468118ms)"],"step_count":1} 2026-03-13T01:18:07.479712708Z {"level":"info","ts":"2026-03-13T01:18:07.479687Z","caller":"traceutil/trace.go:171","msg":"trace[1755450034] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10525; }","duration":"115.344527ms","start":"2026-03-13T01:18:07.364338Z","end":"2026-03-13T01:18:07.479682Z","steps":["trace[1755450034] 'agreement among raft nodes before linearized reading' (duration: 115.331897ms)"],"step_count":1} 2026-03-13T01:18:07.479745509Z {"level":"warn","ts":"2026-03-13T01:18:07.479674Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"206.111871ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/cluster-olm-operator\" ","response":"range_response_count:1 size:2657"} 2026-03-13T01:18:07.479767490Z {"level":"warn","ts":"2026-03-13T01:18:07.479741Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"209.761657ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/openshift-ovn-kubernetes-kube-rbac-proxy\" ","response":"range_response_count:1 size:652"} 2026-03-13T01:18:07.479775250Z {"level":"info","ts":"2026-03-13T01:18:07.479753Z","caller":"traceutil/trace.go:171","msg":"trace[1661301134] range","detail":"{range_begin:/kubernetes.io/clusterroles/cluster-olm-operator; range_end:; response_count:1; response_revision:10525; }","duration":"206.244195ms","start":"2026-03-13T01:18:07.273495Z","end":"2026-03-13T01:18:07.479739Z","steps":["trace[1661301134] 'agreement among raft nodes before linearized reading' (duration: 206.05984ms)"],"step_count":1} 2026-03-13T01:18:07.479810471Z {"level":"info","ts":"2026-03-13T01:18:07.479776Z","caller":"traceutil/trace.go:171","msg":"trace[2077941651] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-ovn-kubernetes-kube-rbac-proxy; range_end:; response_count:1; response_revision:10525; }","duration":"209.810818ms","start":"2026-03-13T01:18:07.269955Z","end":"2026-03-13T01:18:07.479766Z","steps":["trace[2077941651] 'agreement among raft nodes before linearized reading' (duration: 209.727845ms)"],"step_count":1} 2026-03-13T01:18:07.479837011Z {"level":"info","ts":"2026-03-13T01:18:07.479813Z","caller":"traceutil/trace.go:171","msg":"trace[1151840716] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10525; }","duration":"179.964247ms","start":"2026-03-13T01:18:07.299844Z","end":"2026-03-13T01:18:07.479808Z","steps":["trace[1151840716] 'agreement among raft nodes before linearized reading' (duration: 179.952136ms)"],"step_count":1} 2026-03-13T01:18:07.479861962Z {"level":"info","ts":"2026-03-13T01:18:07.479682Z","caller":"traceutil/trace.go:171","msg":"trace[1341566812] range","detail":"{range_begin:/kubernetes.io/clusterroles/aggregate-olm-edit; range_end:; response_count:1; response_revision:10525; }","duration":"189.582519ms","start":"2026-03-13T01:18:07.290080Z","end":"2026-03-13T01:18:07.479663Z","steps":["trace[1341566812] 'agreement among raft nodes before linearized reading' (duration: 189.514957ms)"],"step_count":1} 2026-03-13T01:18:07.479909163Z {"level":"info","ts":"2026-03-13T01:18:07.479880Z","caller":"traceutil/trace.go:171","msg":"trace[1357275158] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-csi-provisioner-configmap-and-secret-reader-role; range_end:; response_count:1; response_revision:10525; }","duration":"199.96452ms","start":"2026-03-13T01:18:07.279908Z","end":"2026-03-13T01:18:07.479872Z","steps":["trace[1357275158] 'agreement among raft nodes before linearized reading' (duration: 199.94218ms)"],"step_count":1} 2026-03-13T01:18:07.479936464Z {"level":"warn","ts":"2026-03-13T01:18:07.479902Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"213.097684ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/openshift-csi-resizer-storageclass-reader-role\" ","response":"range_response_count:1 size:1179"} 2026-03-13T01:18:07.479946684Z {"level":"info","ts":"2026-03-13T01:18:07.479916Z","caller":"traceutil/trace.go:171","msg":"trace[187587766] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10525; }","duration":"167.349867ms","start":"2026-03-13T01:18:07.312555Z","end":"2026-03-13T01:18:07.479905Z","steps":["trace[187587766] 'agreement among raft nodes before linearized reading' (duration: 167.318016ms)"],"step_count":1} 2026-03-13T01:18:07.479960785Z {"level":"info","ts":"2026-03-13T01:18:07.479940Z","caller":"traceutil/trace.go:171","msg":"trace[1123369628] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-csi-resizer-storageclass-reader-role; range_end:; response_count:1; response_revision:10525; }","duration":"213.164966ms","start":"2026-03-13T01:18:07.266766Z","end":"2026-03-13T01:18:07.479931Z","steps":["trace[1123369628] 'agreement among raft nodes before linearized reading' (duration: 213.102554ms)"],"step_count":1} 2026-03-13T01:18:07.479984975Z {"level":"warn","ts":"2026-03-13T01:18:07.479959Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"203.062231ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusterversions/version\" ","response":"range_response_count:1 size:5635"} 2026-03-13T01:18:07.480007426Z {"level":"info","ts":"2026-03-13T01:18:07.479983Z","caller":"traceutil/trace.go:171","msg":"trace[691149640] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10525; }","duration":"203.098532ms","start":"2026-03-13T01:18:07.276878Z","end":"2026-03-13T01:18:07.479977Z","steps":["trace[691149640] 'agreement among raft nodes before linearized reading' (duration: 203.051711ms)"],"step_count":1} 2026-03-13T01:18:07.480060627Z {"level":"warn","ts":"2026-03-13T01:18:07.480029Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"217.378245ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/openshift-csi-provisioner-volumeattachment-reader-role\" ","response":"range_response_count:1 size:1198"} 2026-03-13T01:18:07.480087258Z {"level":"info","ts":"2026-03-13T01:18:07.480059Z","caller":"traceutil/trace.go:171","msg":"trace[1272907183] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-csi-provisioner-volumeattachment-reader-role; range_end:; response_count:1; response_revision:10525; }","duration":"217.427677ms","start":"2026-03-13T01:18:07.262624Z","end":"2026-03-13T01:18:07.480052Z","steps":["trace[1272907183] 'agreement among raft nodes before linearized reading' (duration: 217.379656ms)"],"step_count":1} 2026-03-13T01:18:07.480087258Z {"level":"warn","ts":"2026-03-13T01:18:07.480074Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"205.822753ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-multus/multus-ac\" ","response":"range_response_count:1 size:896"} 2026-03-13T01:18:07.480118669Z {"level":"info","ts":"2026-03-13T01:18:07.480093Z","caller":"traceutil/trace.go:171","msg":"trace[1097837335] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-multus/multus-ac; range_end:; response_count:1; response_revision:10525; }","duration":"205.849854ms","start":"2026-03-13T01:18:07.274238Z","end":"2026-03-13T01:18:07.480088Z","steps":["trace[1097837335] 'agreement among raft nodes before linearized reading' (duration: 205.810283ms)"],"step_count":1} 2026-03-13T01:18:07.480151810Z {"level":"info","ts":"2026-03-13T01:18:07.480130Z","caller":"traceutil/trace.go:171","msg":"trace[1667087336] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10525; }","duration":"193.86328ms","start":"2026-03-13T01:18:07.286234Z","end":"2026-03-13T01:18:07.480098Z","steps":["trace[1667087336] 'agreement among raft nodes before linearized reading' (duration: 193.795948ms)"],"step_count":1} 2026-03-13T01:18:07.480249552Z {"level":"info","ts":"2026-03-13T01:18:07.480204Z","caller":"traceutil/trace.go:171","msg":"trace[1847163307] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10525; }","duration":"169.860843ms","start":"2026-03-13T01:18:07.310331Z","end":"2026-03-13T01:18:07.480192Z","steps":["trace[1847163307] 'agreement among raft nodes before linearized reading' (duration: 169.832522ms)"],"step_count":1} 2026-03-13T01:18:07.480325374Z {"level":"info","ts":"2026-03-13T01:18:07.479833Z","caller":"traceutil/trace.go:171","msg":"trace[180361028] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-operators; range_end:; response_count:1; response_revision:10525; }","duration":"174.254337ms","start":"2026-03-13T01:18:07.305548Z","end":"2026-03-13T01:18:07.479802Z","steps":["trace[180361028] 'agreement among raft nodes before linearized reading' (duration: 174.167705ms)"],"step_count":1} 2026-03-13T01:18:07.480349875Z {"level":"info","ts":"2026-03-13T01:18:07.480215Z","caller":"traceutil/trace.go:171","msg":"trace[326025795] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/network; range_end:; response_count:1; response_revision:10525; }","duration":"198.027139ms","start":"2026-03-13T01:18:07.282182Z","end":"2026-03-13T01:18:07.480210Z","steps":["trace[326025795] 'agreement among raft nodes before linearized reading' (duration: 197.375242ms)"],"step_count":1} 2026-03-13T01:18:07.480402816Z {"level":"warn","ts":"2026-03-13T01:18:07.480349Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"227.066589ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/csi-snapshot-controller-operator-clusterrole\" ","response":"range_response_count:1 size:1641"} 2026-03-13T01:18:07.480425477Z {"level":"info","ts":"2026-03-13T01:18:07.480353Z","caller":"traceutil/trace.go:171","msg":"trace[1064900902] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10525; }","duration":"174.007411ms","start":"2026-03-13T01:18:07.306329Z","end":"2026-03-13T01:18:07.480336Z","steps":["trace[1064900902] 'agreement among raft nodes before linearized reading' (duration: 173.979181ms)"],"step_count":1} 2026-03-13T01:18:07.480453397Z {"level":"info","ts":"2026-03-13T01:18:07.480292Z","caller":"traceutil/trace.go:171","msg":"trace[1611752260] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10525; }","duration":"196.988552ms","start":"2026-03-13T01:18:07.283297Z","end":"2026-03-13T01:18:07.480286Z","steps":["trace[1611752260] 'agreement among raft nodes before linearized reading' (duration: 196.973182ms)"],"step_count":1} 2026-03-13T01:18:07.480453397Z {"level":"warn","ts":"2026-03-13T01:18:07.480436Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"223.745532ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/net-attach-def-project\" ","response":"range_response_count:1 size:705"} 2026-03-13T01:18:07.480479738Z {"level":"info","ts":"2026-03-13T01:18:07.480454Z","caller":"traceutil/trace.go:171","msg":"trace[641006884] range","detail":"{range_begin:/kubernetes.io/clusterroles/net-attach-def-project; range_end:; response_count:1; response_revision:10525; }","duration":"223.779773ms","start":"2026-03-13T01:18:07.256670Z","end":"2026-03-13T01:18:07.480450Z","steps":["trace[641006884] 'agreement among raft nodes before linearized reading' (duration: 223.745113ms)"],"step_count":1} 2026-03-13T01:18:07.480479738Z {"level":"info","ts":"2026-03-13T01:18:07.480401Z","caller":"traceutil/trace.go:171","msg":"trace[1200223861] range","detail":"{range_begin:/kubernetes.io/clusterroles/csi-snapshot-controller-operator-clusterrole; range_end:; response_count:1; response_revision:10525; }","duration":"227.131331ms","start":"2026-03-13T01:18:07.253263Z","end":"2026-03-13T01:18:07.480395Z","steps":["trace[1200223861] 'agreement among raft nodes before linearized reading' (duration: 227.057189ms)"],"step_count":1} 2026-03-13T01:18:07.480512489Z {"level":"info","ts":"2026-03-13T01:18:07.479785Z","caller":"traceutil/trace.go:171","msg":"trace[372321042] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10525; }","duration":"176.836325ms","start":"2026-03-13T01:18:07.302940Z","end":"2026-03-13T01:18:07.479776Z","steps":["trace[372321042] 'agreement among raft nodes before linearized reading' (duration: 176.818614ms)"],"step_count":1} 2026-03-13T01:18:07.480591801Z {"level":"warn","ts":"2026-03-13T01:18:07.480562Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"220.473417ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/openshift-csi-main-snapshotter-role\" ","response":"range_response_count:1 size:1707"} 2026-03-13T01:18:07.480601261Z {"level":"info","ts":"2026-03-13T01:18:07.480585Z","caller":"traceutil/trace.go:171","msg":"trace[100294841] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-csi-main-snapshotter-role; range_end:; response_count:1; response_revision:10525; }","duration":"220.514188ms","start":"2026-03-13T01:18:07.260066Z","end":"2026-03-13T01:18:07.480580Z","steps":["trace[100294841] 'agreement among raft nodes before linearized reading' (duration: 220.457496ms)"],"step_count":1} 2026-03-13T01:18:07.480647323Z {"level":"info","ts":"2026-03-13T01:18:07.479909Z","caller":"traceutil/trace.go:171","msg":"trace[1873625444] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10525; }","duration":"183.209032ms","start":"2026-03-13T01:18:07.296696Z","end":"2026-03-13T01:18:07.479905Z","steps":["trace[1873625444] 'agreement among raft nodes before linearized reading' (duration: 183.194652ms)"],"step_count":1} 2026-03-13T01:18:07.480730795Z {"level":"warn","ts":"2026-03-13T01:18:07.480697Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"221.875634ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/events/openshift-apiserver-operator/\" range_end:\"/kubernetes.io/events/openshift-apiserver-operator0\" ","response":"range_response_count:75 size:88250"} 2026-03-13T01:18:07.480740925Z {"level":"info","ts":"2026-03-13T01:18:07.480727Z","caller":"traceutil/trace.go:171","msg":"trace[825767185] range","detail":"{range_begin:/kubernetes.io/events/openshift-apiserver-operator/; range_end:/kubernetes.io/events/openshift-apiserver-operator0; response_count:75; response_revision:10525; }","duration":"221.912484ms","start":"2026-03-13T01:18:07.258807Z","end":"2026-03-13T01:18:07.480720Z","steps":["trace[825767185] 'agreement among raft nodes before linearized reading' (duration: 221.589886ms)"],"step_count":1} 2026-03-13T01:18:07.480839008Z {"level":"warn","ts":"2026-03-13T01:18:07.480767Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"220.638281ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/secrets/openshift-kube-controller-manager/builder-dockercfg-fqdpp\\000\" range_end:\"/kubernetes.io/secrets0\" limit:100 revision:10522 ","response":"range_response_count:100 size:275296"} 2026-03-13T01:18:07.480839008Z {"level":"info","ts":"2026-03-13T01:18:07.480817Z","caller":"traceutil/trace.go:171","msg":"trace[2147066960] range","detail":"{range_begin:/kubernetes.io/secrets/openshift-kube-controller-manager/builder-dockercfg-fqdpp\u0000; range_end:/kubernetes.io/secrets0; response_count:100; response_revision:10525; }","duration":"220.698413ms","start":"2026-03-13T01:18:07.260107Z","end":"2026-03-13T01:18:07.480806Z","steps":["trace[2147066960] 'agreement among raft nodes before linearized reading' (duration: 220.009165ms)"],"step_count":1} 2026-03-13T01:18:07.481068494Z {"level":"info","ts":"2026-03-13T01:18:07.479369Z","caller":"traceutil/trace.go:171","msg":"trace[1880488214] transaction","detail":"{read_only:false; response_revision:10524; number_of_response:1; }","duration":"230.201981ms","start":"2026-03-13T01:18:07.249160Z","end":"2026-03-13T01:18:07.479362Z","steps":["trace[1880488214] 'process raft request' (duration: 227.647354ms)"],"step_count":1} 2026-03-13T01:18:10.438369293Z {"level":"info","ts":"2026-03-13T01:18:10.438183Z","caller":"traceutil/trace.go:171","msg":"trace[1453921788] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/configs.operator.openshift.io; range_end:; response_count:1; response_revision:10679; }","duration":"104.812132ms","start":"2026-03-13T01:18:10.333354Z","end":"2026-03-13T01:18:10.438166Z","steps":["trace[1453921788] 'range keys from in-memory index tree' (duration: 104.623876ms)"],"step_count":1} 2026-03-13T01:18:10.438424434Z {"level":"info","ts":"2026-03-13T01:18:10.438291Z","caller":"traceutil/trace.go:171","msg":"trace[1801658403] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10679; }","duration":"102.198803ms","start":"2026-03-13T01:18:10.336086Z","end":"2026-03-13T01:18:10.438285Z","steps":["trace[1801658403] 'range keys from in-memory index tree' (duration: 102.158853ms)"],"step_count":1} 2026-03-13T01:18:10.438469436Z {"level":"info","ts":"2026-03-13T01:18:10.438257Z","caller":"traceutil/trace.go:171","msg":"trace[300229453] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10679; }","duration":"103.656271ms","start":"2026-03-13T01:18:10.334597Z","end":"2026-03-13T01:18:10.438253Z","steps":["trace[300229453] 'range keys from in-memory index tree' (duration: 103.559229ms)"],"step_count":1} 2026-03-13T01:18:10.438650700Z {"level":"info","ts":"2026-03-13T01:18:10.438570Z","caller":"traceutil/trace.go:171","msg":"trace[1583675132] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/configs.imageregistry.operator.openshift.io; range_end:; response_count:1; response_revision:10679; }","duration":"108.391685ms","start":"2026-03-13T01:18:10.330157Z","end":"2026-03-13T01:18:10.438549Z","steps":["trace[1583675132] 'range keys from in-memory index tree' (duration: 108.297473ms)"],"step_count":1} 2026-03-13T01:18:10.438785814Z {"level":"info","ts":"2026-03-13T01:18:10.438728Z","caller":"traceutil/trace.go:171","msg":"trace[928096927] transaction","detail":"{read_only:false; response_revision:10680; number_of_response:1; }","duration":"100.503099ms","start":"2026-03-13T01:18:10.338204Z","end":"2026-03-13T01:18:10.438707Z","steps":["trace[928096927] 'process raft request' (duration: 31.660598ms)","trace[928096927] 'compare' (duration: 68.238025ms)"],"step_count":2} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715154662741023135 0ustar00000000000000002026-03-13T01:14:55.982345638Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-78885b775b-jrrjv/oauth-apiserver_current.log0000640000000000000000000011414215154662741031352 0ustar00000000000000002026-03-13T01:16:14.440701458Z E0313 01:16:14.439483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:14.440701458Z E0313 01:16:14.439682 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:14.440701458Z E0313 01:16:14.439852 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:14.440701458Z E0313 01:16:14.440291 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:14.489292182Z E0313 01:16:14.489194 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:14.509725305Z E0313 01:16:14.507998 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:14.516838958Z E0313 01:16:14.516796 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:14.525427460Z E0313 01:16:14.525394 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.947611234Z E0313 01:16:16.947532 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.947910752Z E0313 01:16:16.947866 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.948098617Z E0313 01:16:16.948064 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.948784936Z E0313 01:16:16.948361 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.948784936Z E0313 01:16:16.948587 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.948784936Z E0313 01:16:16.948696 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.948820027Z E0313 01:16:16.947547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.949281499Z E0313 01:16:16.949233 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.949468964Z E0313 01:16:16.949431 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:16.949707111Z E0313 01:16:16.949598 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:26.802825603Z W0313 01:16:26.802727 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:27.819274018Z W0313 01:16:27.819179 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:28.887927234Z W0313 01:16:28.887838 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:30.463166490Z W0313 01:16:30.463059 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:30.593686992Z W0313 01:16:30.593589 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:31.464292021Z W0313 01:16:31.464176 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:32.153089890Z W0313 01:16:32.152994 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:32.528539748Z W0313 01:16:32.528436 1 logging.go:55] [core] [Channel #17 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:33.088737477Z W0313 01:16:33.088586 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:34.690150911Z W0313 01:16:34.690037 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:34.918215343Z W0313 01:16:34.918114 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:35.792093910Z W0313 01:16:35.792026 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:35.898695724Z W0313 01:16:35.898593 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:36.266268240Z W0313 01:16:36.266155 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:40.326704204Z W0313 01:16:40.326535 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:44.405693490Z E0313 01:16:44.402316 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:44.405693490Z E0313 01:16:44.403133 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:44.405693490Z E0313 01:16:44.403540 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:44.405693490Z E0313 01:16:44.404082 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:44.405693490Z E0313 01:16:44.404585 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:44.423698188Z E0313 01:16:44.420676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:44.423698188Z E0313 01:16:44.420812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:44.423698188Z E0313 01:16:44.420824 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:44.423698188Z E0313 01:16:44.421168 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:44.423698188Z E0313 01:16:44.421188 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.656623140Z W0313 01:16:46.656508 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-13T01:16:46.964486710Z E0313 01:16:46.964403 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.965009424Z E0313 01:16:46.964968 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.965064636Z E0313 01:16:46.965017 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.965362914Z E0313 01:16:46.965320 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.965532339Z E0313 01:16:46.965488 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.965604620Z E0313 01:16:46.965564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.965687803Z E0313 01:16:46.965318 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.965912829Z E0313 01:16:46.965870 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.968500489Z E0313 01:16:46.968456 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:16:46.968500489Z E0313 01:16:46.968476 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.428018334Z E0313 01:17:14.427934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.428080046Z E0313 01:17:14.428031 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.428287472Z E0313 01:17:14.428245 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.428367464Z E0313 01:17:14.428333 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.428586000Z E0313 01:17:14.428553 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.459885407Z E0313 01:17:14.459808 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.459928298Z E0313 01:17:14.459889 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.460432842Z E0313 01:17:14.460166 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.460670568Z E0313 01:17:14.460591 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.460998447Z E0313 01:17:14.460946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.487492034Z E0313 01:17:14.487422 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.494403211Z E0313 01:17:14.494340 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.540014705Z E0313 01:17:14.539959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:14.549091841Z E0313 01:17:14.549044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.971726656Z E0313 01:17:16.971597 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.971857660Z E0313 01:17:16.971810 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.972018014Z E0313 01:17:16.971973 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.972148087Z E0313 01:17:16.971610 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.972303712Z E0313 01:17:16.972248 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.972303712Z E0313 01:17:16.972254 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.972303712Z E0313 01:17:16.972273 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.972427605Z E0313 01:17:16.971812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.972716083Z E0313 01:17:16.972620 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:16.973065322Z E0313 01:17:16.973000 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.415472630Z E0313 01:17:44.415411 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.415472630Z E0313 01:17:44.415419 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.415472630Z E0313 01:17:44.415432 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.415582152Z E0313 01:17:44.415559 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.415698794Z E0313 01:17:44.415671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.435384904Z E0313 01:17:44.434526 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.435384904Z E0313 01:17:44.434872 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.435384904Z E0313 01:17:44.435045 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.435384904Z E0313 01:17:44.435271 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:44.435384904Z E0313 01:17:44.435367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.978161570Z E0313 01:17:46.978086 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.978690344Z E0313 01:17:46.978616 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.978749225Z E0313 01:17:46.978713 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.978749225Z E0313 01:17:46.978726 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.978939930Z E0313 01:17:46.978898 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.979011662Z E0313 01:17:46.978961 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.979125845Z E0313 01:17:46.978721 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.997096025Z E0313 01:17:46.997016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.997221689Z E0313 01:17:46.997120 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:46.997769743Z E0313 01:17:46.997722 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=907628262043521217, SKID=18:E9:CA:99:C8:C8:A2:F7:E1:7F:27:52:71:C0:35:67:DD:A2:90:D7, AKID=6E:8E:A6:91:00:0A:D9:8B:35:C0:28:63:5B:10:18:7F:42:99:7A:9F failed: x509: certificate signed by unknown authority]" 2026-03-13T01:17:53.512297573Z I0313 01:17:53.512219 1 policy_source.go:224] refreshing policies 2026-03-13T01:18:07.541913025Z I0313 01:18:07.541836 1 policy_source.go:224] refreshing policies config/pod/openshift-ingress/router-default-79f8cd6fdd-cnrhm.json0000640000000000000000000001533715154662741023472 0ustar0000000000000000{"metadata":{"name":"router-default-79f8cd6fdd-cnrhm","generateName":"router-default-79f8cd6fdd-","namespace":"openshift-ingress","uid":"0671fdd0-b358-40f9-ae49-2c5a9004edb3","resourceVersion":"6850","creationTimestamp":"2026-03-13T01:14:01Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"9cb46c8fc","pod-template-hash":"79f8cd6fdd"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-79f8cd6fdd","uid":"b4dfdc2d-ce0e-4099-909e-360df1994d7f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-ftn5x","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-ftn5x","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["9cb46c8fc"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:01Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062515154662741037411 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-bxqp22026-03-13T01:17:38.940976030Z Copying system trust bundle 2026-03-13T01:17:39.044318231Z W0313 01:17:39.042085 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-13T01:17:39.044318231Z I0313 01:17:39.042525 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T01:17:39.044318231Z I0313 01:17:39.042542 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T01:17:39.044318231Z I0313 01:17:39.044239 1 observer_polling.go:159] Starting file observer 2026-03-13T01:17:39.044509257Z I0313 01:17:39.044452 1 observer_polling.go:159] Starting file observer 2026-03-13T01:17:39.063835564Z I0313 01:17:39.063782 1 builder.go:304] cluster-authentication-operator version - 2026-03-13T01:17:39.064715949Z I0313 01:17:39.064689 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T01:17:40.039379775Z I0313 01:17:40.039300 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-13T01:17:40.045209486Z I0313 01:17:40.045095 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-13T01:17:40.045209486Z I0313 01:17:40.045115 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-13T01:17:40.045209486Z I0313 01:17:40.045132 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-13T01:17:40.045209486Z I0313 01:17:40.045137 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-13T01:17:40.050725549Z I0313 01:17:40.048659 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-13T01:17:40.050725549Z W0313 01:17:40.048696 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:17:40.050725549Z W0313 01:17:40.048704 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-13T01:17:40.050725549Z W0313 01:17:40.048712 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-13T01:17:40.050725549Z W0313 01:17:40.048717 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-13T01:17:40.050725549Z W0313 01:17:40.048721 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-13T01:17:40.050725549Z W0313 01:17:40.048725 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-13T01:17:40.050725549Z I0313 01:17:40.048714 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-13T01:17:40.054052624Z I0313 01:17:40.053880 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-13T01:17:40.054052624Z I0313 01:17:40.053982 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-13T01:17:40.057957027Z I0313 01:17:40.057011 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-13T01:17:40.057973096Z I0313 01:17:40.057942 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:17:40.058384955Z I0313 01:17:40.058167 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-13T01:17:40.058384955Z I0313 01:17:40.058183 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-13T01:17:40.058461450Z I0313 01:17:40.058427 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773364418\" (2026-03-13 01:13:43 +0000 UTC to 2028-03-12 01:13:44 +0000 UTC (now=2026-03-13 01:17:40.058383296 +0000 UTC))" 2026-03-13T01:17:40.058562612Z I0313 01:17:40.058536 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-13T01:17:40.058562612Z I0313 01:17:40.058554 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:17:40.058700732Z I0313 01:17:40.058682 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773364659\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773364659\" (2026-03-13 00:17:39 +0000 UTC to 2027-03-13 00:17:39 +0000 UTC (now=2026-03-13 01:17:40.058657275 +0000 UTC))" 2026-03-13T01:17:40.058814004Z I0313 01:17:40.058738 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-13T01:17:40.058814004Z I0313 01:17:40.058769 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-13T01:17:40.058814004Z I0313 01:17:40.058800 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T01:17:40.058892698Z I0313 01:17:40.058874 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-13T01:17:40.060316483Z I0313 01:17:40.060287 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-13T01:17:40.061509125Z I0313 01:17:40.061360 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-13T01:17:40.061737289Z I0313 01:17:40.061712 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-13T01:17:40.160776836Z I0313 01:17:40.159030 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-13T01:17:40.160776836Z I0313 01:17:40.159799 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-13T01:17:40.160776836Z I0313 01:17:40.159825 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 01:03:11 +0000 UTC to 2026-03-14 01:03:11 +0000 UTC (now=2026-03-13 01:17:40.159794579 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.159868 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-13T01:17:40.160776836Z I0313 01:17:40.159979 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773364418\" (2026-03-13 01:13:43 +0000 UTC to 2028-03-12 01:13:44 +0000 UTC (now=2026-03-13 01:17:40.159960286 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.160101 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773364659\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773364659\" (2026-03-13 00:17:39 +0000 UTC to 2027-03-13 00:17:39 +0000 UTC (now=2026-03-13 01:17:40.160090567 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.160195 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 00:56:08 +0000 UTC to 2036-03-10 00:56:08 +0000 UTC (now=2026-03-13 01:17:40.16018481 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.160208 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-13 01:03:12 +0000 UTC to 2026-03-14 01:03:12 +0000 UTC (now=2026-03-13 01:17:40.160200599 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.160221 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-13 01:03:13 +0000 UTC to 2027-03-13 01:03:13 +0000 UTC (now=2026-03-13 01:17:40.160212678 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.160233 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-13 01:03:13 +0000 UTC to 2027-03-13 01:03:13 +0000 UTC (now=2026-03-13 01:17:40.160226427 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.160245 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-13 01:03:10 +0000 UTC to 2036-03-10 01:03:10 +0000 UTC (now=2026-03-13 01:17:40.160237976 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.160257 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-13 01:03:11 +0000 UTC to 2026-03-14 01:03:11 +0000 UTC (now=2026-03-13 01:17:40.160249675 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.160352 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773364418\" (2026-03-13 01:13:43 +0000 UTC to 2028-03-12 01:13:44 +0000 UTC (now=2026-03-13 01:17:40.160342038 +0000 UTC))" 2026-03-13T01:17:40.160776836Z I0313 01:17:40.160436 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773364659\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773364659\" (2026-03-13 00:17:39 +0000 UTC to 2027-03-13 00:17:39 +0000 UTC (now=2026-03-13 01:17:40.160427832 +0000 UTC))" 2026-03-13T01:17:58.120592166Z I0313 01:17:58.120510 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-13T01:17:58.121277474Z I0313 01:17:58.121253 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... authentication-operator_previous.log0000640000000000000000000000356015154662741037601 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-bxqp22026-03-13T01:16:19.385349018Z Copying system trust bundle 2026-03-13T01:16:19.490084012Z W0313 01:16:19.488407 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-13T01:16:19.490084012Z I0313 01:16:19.489188 1 observer_polling.go:159] Starting file observer 2026-03-13T01:16:19.490084012Z I0313 01:16:19.489555 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-13T01:16:19.490084012Z I0313 01:16:19.489600 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-13T01:16:19.490322039Z I0313 01:16:19.490284 1 observer_polling.go:159] Starting file observer 2026-03-13T01:17:19.502207740Z W0313 01:17:19.502114 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-7c6989d6c4-bxqp2) 2026-03-13T01:17:19.502730334Z I0313 01:17:19.502686 1 builder.go:304] cluster-authentication-operator version - 2026-03-13T01:17:19.504128692Z I0313 01:17:19.504059 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-13T01:17:38.419520255Z I0313 01:17:38.419335 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller. 2026-03-13T01:17:38.419564182Z F0313 01:17:38.419513 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock": context canceled config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-bxqp2.json0000640000000000000000000002117415154662741030301 0ustar0000000000000000{"metadata":{"name":"authentication-operator-7c6989d6c4-bxqp2","generateName":"authentication-operator-7c6989d6c4-","namespace":"openshift-authentication-operator","uid":"f9b713fb-64ce-4a01-951c-1f31df62e1ae","resourceVersion":"9877","creationTimestamp":"2026-03-13T01:11:38Z","labels":{"app":"authentication-operator","pod-template-hash":"7c6989d6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-7c6989d6c4","uid":"411a5d71-cc15-4d35-8cef-abd8737e05c9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-4chtg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d3571ade02a7c61123d62c53fda6a57031a52c058c0571759dc09f96b23978f"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.34_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-4chtg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c0"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:16:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:16:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-03-13T01:13:10Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-13T01:17:38Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"Copying system trust bundle\nW0313 01:16:19.488407 1 cmd.go:167] Unable to read initial content of \"/tmp/terminate\": open /tmp/terminate: no such file or directory\nI0313 01:16:19.489188 1 observer_polling.go:159] Starting file observer\nI0313 01:16:19.489555 1 cmd.go:253] Using service-serving-cert provided certificates\nI0313 01:16:19.489600 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0313 01:16:19.490284 1 observer_polling.go:159] Starting file observer\nW0313 01:17:19.502114 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-7c6989d6c4-bxqp2)\nI0313 01:17:19.502686 1 builder.go:304] cluster-authentication-operator version -\nI0313 01:17:19.504059 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nI0313 01:17:38.419335 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller.\nF0313 01:17:38.419513 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock\": context canceled\n","startedAt":"2026-03-13T01:16:19Z","finishedAt":"2026-03-13T01:17:38Z","containerID":"cri-o://70de036e29496f4383b5254fadb7f8de5e3a8b0ccfbf1cbf424f334a6aaf519d"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","containerID":"cri-o://a45dea6369e1284e4d6cd6145c197a33c24d0024d01b01a27e517f9663b1c0a5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-4chtg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000004245215154662741020656 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:07:57Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:08:07Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-854648ff6d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:08:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-d64cfc9db to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:08:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-7d9c49f57b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:08:11Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:08:12Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:08:12Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:34Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:35Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:35Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:35Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:37Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-7d9c49f57b-h46pz","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:38Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-d64cfc9db-8l7kq","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:38Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-854648ff6d-nrzpj","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:11:39Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-nrzpj to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-8l7kq to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-h46pz to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:13:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:13:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:13:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:13:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:13:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:13:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.24/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.14/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.29/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:24Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:24Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 10.26s (10.26s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 10.226s (10.226s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 10.474s (10.474s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:36Z","reason":"LeaderElection","message":"package-server-manager-854648ff6d-nrzpj_c189a6b5-a848-4263-a4f6-b2387ee02dda became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:36Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:37Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:38Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/packageserver-68f6795949-v9w8g to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-68f6795949 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:38Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-68f6795949-v9w8g","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:38Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:14:38Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:15:40Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_packageserver-68f6795949-v9w8g_openshift-operator-lifecycle-manager_2ce47660-f7cc-4669-a00d-83422f0f6d55_0(8a528b2fe74eac92f2052525ed13b81b615fc81fd742c6db7340fb12042b39d0): error adding pod openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"8a528b2fe74eac92f2052525ed13b81b615fc81fd742c6db7340fb12042b39d0\" Netns:\"/var/run/netns/419f4548-4297-47ce-9599-9149084052f1\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=packageserver-68f6795949-v9w8g;K8S_POD_INFRA_CONTAINER_ID=8a528b2fe74eac92f2052525ed13b81b615fc81fd742c6db7340fb12042b39d0;K8S_POD_UID=2ce47660-f7cc-4669-a00d-83422f0f6d55\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/packageserver-68f6795949-v9w8g] networking: Multus: [openshift-operator-lifecycle-manager/packageserver-68f6795949-v9w8g/2ce47660-f7cc-4669-a00d-83422f0f6d55]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod packageserver-68f6795949-v9w8g in out of cluster comm: SetNetworkStatus: failed to update the pod packageserver-68f6795949-v9w8g in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/packageserver-68f6795949-v9w8g?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:16:41Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_packageserver-68f6795949-v9w8g_openshift-operator-lifecycle-manager_2ce47660-f7cc-4669-a00d-83422f0f6d55_0(1932b318046cc2e98b5dbbb88f750937661f0160a1466991c8c7cc862089bb20): error adding pod openshift-operator-lifecycle-manager_packageserver-68f6795949-v9w8g to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"1932b318046cc2e98b5dbbb88f750937661f0160a1466991c8c7cc862089bb20\" Netns:\"/var/run/netns/7ab4bd3d-3d2a-4137-9aee-9bb261de53d7\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=packageserver-68f6795949-v9w8g;K8S_POD_INFRA_CONTAINER_ID=1932b318046cc2e98b5dbbb88f750937661f0160a1466991c8c7cc862089bb20;K8S_POD_UID=2ce47660-f7cc-4669-a00d-83422f0f6d55\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/packageserver-68f6795949-v9w8g] networking: Multus: [openshift-operator-lifecycle-manager/packageserver-68f6795949-v9w8g/2ce47660-f7cc-4669-a00d-83422f0f6d55]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod packageserver-68f6795949-v9w8g in out of cluster comm: SetNetworkStatus: failed to update the pod packageserver-68f6795949-v9w8g in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/packageserver-68f6795949-v9w8g?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:16:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.66/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:17:38Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:17:38Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-13T01:17:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" already present on machine","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001773615154662741015465 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:37Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-74b98ff8f9-m4bbb","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:37Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-74b98ff8f9-m4bbb to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:37Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-74b98ff8f9 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : configmap \"etcd-serving-ca\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:44Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-74b98ff8f9 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:45Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-74b98ff8f9-m4bbb","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:45Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-65c58d4d64-6dpp5","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-65c58d4d64 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:47Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-65c58d4d64-6dpp5 to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:48Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-69c74d8d69 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:48Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-65c58d4d64 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:48Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:48Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:48Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-65c58d4d64-6dpp5","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:48Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-69c74d8d69-jpj8z","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:13:56Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" in 8.144s (8.144s including waiting). Image size: 589379637 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:00Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:00Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:02Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-69c74d8d69-jpj8z to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:03Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:04Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:04Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:06Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:06Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:06Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:06Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:08Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-13T01:14:08Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[-]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa failed: reason withheld\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000010176115154662741017306 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:07:55Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-799b6db4d7 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:08:06Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:11:35Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-799b6db4d7-mvmt2","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-mvmt2 to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" in 4.808s (4.808s including waiting). Image size: 512273539 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-mvmt2_985ddf7b-dbeb-4116-9780-14abe7a0a763 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:32Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:34Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:34Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:46Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 2, desired generation is 3.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:13:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 2, desired generation is 3.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"openshift-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:14:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:16:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:16:19Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-13T01:16:19Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-network-operator.json0000640000000000000000000002766315154662741017007 0ustar0000000000000000{"items":[{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:07:55Z","reason":"ScalingReplicaSet","message":"Scaled up replica set network-operator-7c649bf6d4 to 1","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:08:05Z","reason":"FailedCreate","message":"Error creating: pods \"network-operator-7c649bf6d4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:35Z","reason":"FailedCreate","message":"Error creating: pods \"network-operator-7c649bf6d4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"Scheduled","message":"Successfully assigned openshift-network-operator/network-operator-7c649bf6d4-bdc4j to master-0","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"SuccessfulCreate","message":"Created pod: network-operator-7c649bf6d4-bdc4j","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3\"","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:41Z","reason":"Failed","message":"Error: services have not yet been read at least once, cannot construct envvars","type":"Warning"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:41Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3\" in 3.398s (3.398s including waiting). Image size: 621647686 bytes.","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:55Z","reason":"Created","message":"Created container: network-operator","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3\" already present on machine","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:55Z","reason":"Started","message":"Started container network-operator","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:57Z","reason":"LeaderElection","message":"master-0_e04361ec-a1ac-475f-8376-f05d8e0724be became leader","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:57Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:58Z","reason":"Scheduled","message":"Successfully assigned openshift-network-operator/mtu-prober-9psj4 to master-0","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:58Z","reason":"SuccessfulCreate","message":"Created pod: mtu-prober-9psj4","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:59Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3\" already present on machine","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:59Z","reason":"Created","message":"Created container: prober","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:11:59Z","reason":"Started","message":"Started container prober","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:12:01Z","reason":"Completed","message":"Job completed","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"SuccessfulCreate","message":"Created pod: iptables-alerter-qclwv","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460\"","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-network-operator/iptables-alerter-qclwv to master-0","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:13:24Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:13:24Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:13:36Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460\"","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460\" in 795ms (795ms including waiting). Image size: 582153879 bytes.","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:13:41Z","reason":"Started","message":"Started container iptables-alerter","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:13:41Z","reason":"Created","message":"Created container: iptables-alerter","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:14:36Z","reason":"LeaderElection","message":"master-0_e04361ec-a1ac-475f-8376-f05d8e0724be stopped leading","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3\" already present on machine","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:14:37Z","reason":"Started","message":"Started container network-operator","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:14:37Z","reason":"Created","message":"Created container: network-operator","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:14:38Z","reason":"LeaderElection","message":"master-0_1a791541-2c1e-42a1-b923-955c1b1fd61a became leader","type":"Normal"},{"namespace":"openshift-network-operator","lastTimestamp":"2026-03-13T01:14:38Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"}]}events/openshift-network-node-identity.json0000640000000000000000000000575615154662741017727 0ustar0000000000000000{"items":[{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Scheduled","message":"Successfully assigned openshift-network-node-identity/network-node-identity-znqwc to master-0","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:26Z","reason":"SuccessfulCreate","message":"Created pod: network-node-identity-znqwc","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"webhook-cert\" : secret \"network-node-identity-cert\" not found","type":"Warning"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:27Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\"","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Started","message":"Started container webhook","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Created","message":"Created container: webhook","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Created","message":"Created container: approver","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Started","message":"Started container approver","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" in 20.88s (20.88s including waiting). Image size: 1637445817 bytes.","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:12:49Z","reason":"LeaderElection","message":"master-0_117467dd-4a54-4c62-8054-6bfbc174e777 became leader","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:15:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:15:45Z","reason":"Created","message":"Created container: approver","type":"Normal"},{"namespace":"openshift-network-node-identity","lastTimestamp":"2026-03-13T01:15:45Z","reason":"Started","message":"Started container approver","type":"Normal"}]}events/openshift-network-diagnostics.json0000640000000000000000000000523215154662741017447 0ustar0000000000000000{"items":[{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:12:23Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:12:23Z","reason":"SuccessfulCreate","message":"Created pod: network-check-source-7c67b67d47-5fv6h","type":"Normal"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:12:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set network-check-source-7c67b67d47 to 1","type":"Normal"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:12:24Z","reason":"Scheduled","message":"Successfully assigned openshift-network-diagnostics/network-check-target-xs8pt to master-0","type":"Normal"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:12:24Z","reason":"SuccessfulCreate","message":"Created pod: network-check-target-xs8pt","type":"Normal"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:12:56Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-mnxgm\" : [object \"openshift-network-diagnostics\"/\"kube-root-ca.crt\" not registered, object \"openshift-network-diagnostics\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:12:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:13:25Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.3/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:13:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3\" already present on machine","type":"Normal"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:13:25Z","reason":"Created","message":"Created container: network-check-target-container","type":"Normal"},{"namespace":"openshift-network-diagnostics","lastTimestamp":"2026-03-13T01:13:25Z","reason":"Started","message":"Started container network-check-target-container","type":"Normal"}]}events/openshift-ovn-kubernetes.json0000640000000000000000000002374015154662741016424 0ustar0000000000000000{"items":[{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:21Z","reason":"SuccessfulCreate","message":"Created pod: ovnkube-node-5h8l9","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:21Z","reason":"Scheduled","message":"Successfully assigned openshift-ovn-kubernetes/ovnkube-node-5h8l9 to master-0","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:21Z","reason":"Scheduled","message":"Successfully assigned openshift-ovn-kubernetes/ovnkube-control-plane-66b55d57d-cjmvd to master-0","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set ovnkube-control-plane-66b55d57d to 1","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:21Z","reason":"SuccessfulCreate","message":"Created pod: ovnkube-control-plane-66b55d57d-cjmvd","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\"","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\"","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:46Z","reason":"SuccessfulDelete","message":"Deleted pod: ovnkube-node-5h8l9","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:48Z","reason":"LeaderElection","message":"ovnkube-control-plane-66b55d57d-cjmvd became leader","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Started","message":"Started container ovnkube-cluster-manager","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Created","message":"Created container: ovnkube-cluster-manager","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" in 22.461s (22.461s including waiting). Image size: 1637445817 bytes.","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" in 22.65s (22.65s including waiting). Image size: 1637445817 bytes.","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Created","message":"Created container: kubecfg-setup","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Started","message":"Started container kubecfg-setup","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:50Z","reason":"Started","message":"Started container kubecfg-setup","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:50Z","reason":"SuccessfulCreate","message":"Created pod: ovnkube-node-v56ct","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:50Z","reason":"Scheduled","message":"Successfully assigned openshift-ovn-kubernetes/ovnkube-node-v56ct to master-0","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:50Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:50Z","reason":"Created","message":"Created container: kubecfg-setup","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Started","message":"Started container kube-rbac-proxy-node","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Created","message":"Created container: ovn-controller","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Started","message":"Started container ovn-controller","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Created","message":"Created container: ovn-acl-logging","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Started","message":"Started container ovn-acl-logging","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Created","message":"Created container: kube-rbac-proxy-node","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Started","message":"Started container nbdb","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Created","message":"Created container: kube-rbac-proxy-ovn-metrics","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Started","message":"Started container kube-rbac-proxy-ovn-metrics","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Created","message":"Created container: northd","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Started","message":"Started container northd","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Created","message":"Created container: nbdb","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:54Z","reason":"Created","message":"Created container: sbdb","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:54Z","reason":"Started","message":"Started container sbdb","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:12:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:17:38Z","reason":"Started","message":"Started container ovnkube-cluster-manager","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:17:38Z","reason":"Created","message":"Created container: ovnkube-cluster-manager","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:17:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\" already present on machine","type":"Normal"},{"namespace":"openshift-ovn-kubernetes","lastTimestamp":"2026-03-13T01:17:40Z","reason":"LeaderElection","message":"ovnkube-control-plane-66b55d57d-cjmvd became leader","type":"Normal"}]}events/openshift-multus.json0000640000000000000000000003150515154662741015004 0ustar0000000000000000{"items":[{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:08Z","reason":"Scheduled","message":"Successfully assigned openshift-multus/multus-rvt5h to master-0","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:08Z","reason":"SuccessfulCreate","message":"Created pod: multus-rvt5h","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:08Z","reason":"SuccessfulCreate","message":"Created pod: multus-additional-cni-plugins-xn5t5","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:08Z","reason":"Scheduled","message":"Successfully assigned openshift-multus/multus-additional-cni-plugins-xn5t5 to master-0","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:09Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916\"","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:09Z","reason":"SuccessfulCreate","message":"Created pod: network-metrics-daemon-zh5fh","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:09Z","reason":"Scheduled","message":"Successfully assigned openshift-multus/network-metrics-daemon-zh5fh to master-0","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:09Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192\"","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:11Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:11Z","reason":"ScalingReplicaSet","message":"Scaled up replica set multus-admission-controller-8d675b596 to 1","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:11Z","reason":"SuccessfulCreate","message":"Created pod: multus-admission-controller-8d675b596-tq7n6","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:16Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245\"","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:16Z","reason":"Started","message":"Started container egress-router-binary-copy","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:16Z","reason":"Created","message":"Created container: egress-router-binary-copy","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:16Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916\" in 7.085s (7.085s including waiting). Image size: 528946249 bytes.","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Started","message":"Started container kube-multus","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Created","message":"Created container: kube-multus","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192\" in 17.022s (17.022s including waiting). Image size: 1238047254 bytes.","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7\"","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Started","message":"Started container cni-plugins","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Created","message":"Created container: cni-plugins","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:26Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245\" in 9.087s (9.087s including waiting). Image size: 683169303 bytes.","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:29Z","reason":"Started","message":"Started container bond-cni-plugin","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:29Z","reason":"Created","message":"Created container: bond-cni-plugin","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:29Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7\" in 2.841s (2.841s including waiting). Image size: 411585608 bytes.","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7\"","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:32Z","reason":"Created","message":"Created container: routeoverride-cni","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:32Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7\" in 1.44s (1.44s including waiting). Image size: 407347126 bytes.","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:32Z","reason":"Started","message":"Started container routeoverride-cni","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:33Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a\"","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-certs\" : object \"openshift-multus\"/\"metrics-daemon-secret\" not registered","type":"Warning"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:43Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Created","message":"Created container: whereabouts-cni-bincopy","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a\" in 15.592s (15.592s including waiting). Image size: 876146500 bytes.","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:48Z","reason":"Started","message":"Started container whereabouts-cni-bincopy","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:50Z","reason":"Started","message":"Started container whereabouts-cni","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:50Z","reason":"Created","message":"Created container: whereabouts-cni","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:50Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a\" already present on machine","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Created","message":"Created container: kube-multus-additional-cni-plugins","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:12:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192\" already present on machine","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-multus/multus-admission-controller-8d675b596-tq7n6 to master-0","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:13:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"webhook-certs\" : secret \"multus-admission-controller-secret\" not found","type":"Warning"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:13:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-certs\" : secret \"metrics-daemon-secret\" not found","type":"Warning"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:13:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"webhook-certs\" : secret \"multus-admission-controller-secret\" not found","type":"Warning"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.4/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.18/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626\"","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9\"","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9\" in 9.951s (9.951s including waiting). Image size: 456575686 bytes.","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626\" in 9.971s (9.971s including waiting). Image size: 448828105 bytes.","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Started","message":"Started container multus-admission-controller","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Created","message":"Created container: multus-admission-controller","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Created","message":"Created container: network-metrics-daemon","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Started","message":"Started container network-metrics-daemon","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-multus","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000011364615154662741020215 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:07:54Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-5c74bfc494 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:08:05Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:11:35Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:11:36Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:11:36Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-5c74bfc494-wbmqn","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-wbmqn to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.6/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" in 5.094s (5.094s including waiting). Image size: 506394574 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-5c74bfc494-wbmqn_43840c60-a5fc-471d-aa53-e1f7e7f2efc4 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:31Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:34Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:34Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:35Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:41Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:41Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:41Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:50Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:51Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:51Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:57Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:58Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:00Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:01Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:01Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:08Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:09Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:11Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:12Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:12Z","reason":"StartingNewRevision","message":"new revision 5 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:17Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:19Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:21Z","reason":"SecretCreated","message":"Created Secret/serving-cert-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:22Z","reason":"StartingNewRevision","message":"new revision 6 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:22Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-5 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:22Z","reason":"RevisionTriggered","message":"new revision 5 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-6 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-6 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-6 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-6 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-6 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:29Z","reason":"PodCreated","message":"Created Pod/installer-5-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:30Z","reason":"SecretCreated","message":"Created Secret/serving-cert-6 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:31Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-6 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:32Z","reason":"RevisionTriggered","message":"new revision 6 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 5\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 6\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 5\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 6\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:37Z","reason":"PodCreated","message":"Created Pod/revision-pruner-6-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:14:37Z","reason":"PodCreated","message":"Created Pod/installer-6-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:16:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:16:19Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-13T01:16:19Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000001350315154662741016353 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:13:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.37/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:13:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:13:46Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:13:46Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:13:55Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:01Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:01Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:05Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:08Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:08Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:09Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:09Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:16Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.52/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:20Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:20Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:26Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.55/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.64/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.65/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:38Z","reason":"Created","message":"Created container: pruner","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:38Z","reason":"Started","message":"Started container pruner","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-13T01:14:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000016000315154662741022017 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:07:54Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-86d7cdfdfb to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:08:05Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:11:35Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:11:37Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:11:37Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-86d7cdfdfb-v9pv6","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-v9pv6 to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" in 4.811s (4.811s including waiting). Image size: 508888174 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-v9pv6_f24a68c2-683e-4268-954c-ed0db4edb6bc became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-79fvf\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:31Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:31Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:32Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:32Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:32Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:36Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:41Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-79fvf\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:52Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:54Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:57Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:57Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:58Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:00Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:03Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:08Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:12Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:15Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:15Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-controller-manager-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:22Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:27Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:28Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:29Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:30Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/kube-controller-manager-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:35Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:36Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:37Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:37Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:38Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-v9pv6_d7e6a1d0-7efa-4a23-9203-0b5a6fb783f3 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:14:38Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:17:39Z","reason":"InstallerPodFailed","message":"installer errors: installer: icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nI0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nF0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:17:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:17:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"StaticPodsDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-master-0)\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\\nNodeInstallerDegraded: installer: icy-controller-config\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"controller-manager-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=38) \\\"kube-controller-cert-syncer-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"service-ca\\\",\\nNodeInstallerDegraded: (string) (len=15) \\\"recycler-config\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"cloud-config\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=39) \\\"kube-controller-manager-client-cert-key\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"csr-signer\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=66) \\\"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nTargetConfigControllerDegraded: \\\"configmap\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/cluster-policy-controller-config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:17:54Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-13T01:17:55Z","reason":"PodCreated","message":"Created Pod/installer-3-retry-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000704115154662741020170 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:03Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:04Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:04Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:19Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:22Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:23Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:23Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:32Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.60/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:17:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.71/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:17:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:17:56Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-13T01:17:56Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215154662741016373 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T01:14:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.54/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-13T01:14:36Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000025430315154662741020233 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:08:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-68bd585b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:08:12Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:11:36Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-68bd585b-mlslx","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-mlslx to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:12Z","reason":"LeaderElection","message":"kube-apiserver-operator-68bd585b-mlslx_33015ade-5e77-4840-a463-7be0af299d17 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:12Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:12Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:12Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:12Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:12Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:13Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:13Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:13Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:13Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:13Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"),Progressing changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:16Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:17Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:18Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:18Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:18Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:18Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:18Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:18Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:19Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:19Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:19Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:19Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:21Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:21Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:21Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:21Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:21Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:22Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:22Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:22Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:23Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:23Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:23Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:24Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:24Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:24Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:25Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:27Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:28Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:30Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:32Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:32Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:13:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:00Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:00Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:00Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:00Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:00Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:00Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:01Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:02Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:14Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:16Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:17Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:20Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:20Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:22Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:25Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:26Z","reason":"InstallerPodFailed","message":"Failed to create installer pod for revision 1 count 0 on node \"master-0\": client rate limiter Wait returned an error: context canceled","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:35Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:35Z","reason":"LeaderElection","message":"kube-apiserver-operator-68bd585b-mlslx_8b6410c5-f374-4dd7-bd1f-a125a2dc246f became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:35Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:14:37Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:17:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:17:54Z","reason":"InstallerPodFailed","message":"installer errors: installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nI0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nF0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:17:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-audit-policies)\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:17:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:17:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-13T01:17:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap/config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\\nTargetConfigControllerDegraded: \\\"configmap/kube-apiserver-pod\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps kube-apiserver-pod)\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615154662741014373 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:14:08Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.48/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:14:08Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:14:09Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:14:09Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:14:40Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:14:55Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:14:55Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:15:09Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:15:09Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:15:10Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:15:23Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:15:23Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:15:23Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:06Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:06Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:06Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:06Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:06Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:06Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:07Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:07Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:07Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:07Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-13T01:17:07Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003751415154662741016231 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:07:57Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-5884b9cd56 to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:08:08Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:11:36Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-5884b9cd56-h4kkj","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-5884b9cd56-h4kkj to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.23/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:23Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:23Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" in 446ms (446ms including waiting). Image size: 518384455 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"LeaderElection","message":"etcd-operator-5884b9cd56-h4kkj_eeeee2ca-9967-4996-9fac-388eaf33e29b became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded changed from Unknown to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:41Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:41Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:44Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:44Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:44Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:47Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:47Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:56Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:56Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:57Z","reason":"DefragControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:14:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:14:02Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:15:59Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:15:59Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:16:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:16:19Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-13T01:16:19Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443715154662741016575 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:13:59Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-78885b775b-jrrjv to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:13:59Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-78885b775b-jrrjv","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:13:59Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-78885b775b to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:14:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:14:00Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:14:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" in 3.056s (3.056s including waiting). Image size: 505344964 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:14:03Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:14:03Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:14:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:14:06Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-13T01:14:06Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015154662741015116 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T01:14:01Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T01:14:01Z","reason":"SuccessfulCreate","message":"Created pod: router-default-79f8cd6fdd-cnrhm","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-13T01:14:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-79f8cd6fdd to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000022071415154662741020325 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:07:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-7c6989d6c4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:08:08Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:11:35Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:11:38Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-7c6989d6c4-bxqp2","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:10Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-7c6989d6c4-bxqp2 to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:22Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:22Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:33Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" in 395ms (395ms including waiting). Image size: 513220825 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:35Z","reason":"LeaderElection","message":"authentication-operator-7c6989d6c4-bxqp2_063df614-3c4a-4f0b-b79e-f8fa18357899 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:35Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to False (\"All is well\"),Progressing set to Unknown (\"\"),Available set to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\",Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:38Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:40Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:40Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-qkc5d\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:40Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-qkc5d\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:42Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:43Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:45Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:47Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:47Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:50Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:52Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:53Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:53Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:53Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:53Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:56Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:13:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:10Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:10Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:10Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:10Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:15Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"oauth-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:14:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.117.27:443/healthz\\\": dial tcp 172.30.117.27:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:16:19Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:17:10Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.13:8443/healthz\": dial tcp 10.128.0.13:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:17:10Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.13:8443/healthz\": dial tcp 10.128.0.13:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:17:38Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:17:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-13T01:17:38Z","reason":"Killing","message":"Container authentication-operator failed liveness probe, will be restarted","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015154662741016303 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-13T01:14:02Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-13T01:14:02Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003457115154662722014624 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":335,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015154662721014104 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000004334515154662706014556 0ustar0000000000000000Mar 13 01:17:32.768729 master-0 kubenswrapper[7110]: I0313 01:17:32.768600 7110 patch_prober.go:28] interesting pod/openshift-config-operator-64488f9d78-bqmmf container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" start-of-body= Mar 13 01:17:32.769706 master-0 kubenswrapper[7110]: I0313 01:17:32.768729 7110 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-64488f9d78-bqmmf" podUID="d56480e0-0885-41e5-a1fc-931a068fbadb" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" Mar 13 01:17:33.368834 master-0 kubenswrapper[7110]: E0313 01:17:33.368730 7110 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 13 01:17:33.368834 master-0 kubenswrapper[7110]: E0313 01:17:33.368780 7110 kubelet_node_status.go:572] "Unable to update node status" err="update node status exceeds retry count" Mar 13 01:17:33.703400 master-0 kubenswrapper[7110]: I0313 01:17:33.703322 7110 patch_prober.go:28] interesting pod/controller-manager-757fb68448-cj9p5 container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.58:8443/healthz\": dial tcp 10.128.0.58:8443: connect: connection refused" start-of-body= Mar 13 01:17:33.703677 master-0 kubenswrapper[7110]: I0313 01:17:33.703409 7110 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-757fb68448-cj9p5" podUID="631f5719-2083-4c99-92cb-2ddc04022d86" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.58:8443/healthz\": dial tcp 10.128.0.58:8443: connect: connection refused" Mar 13 01:17:33.703677 master-0 kubenswrapper[7110]: I0313 01:17:33.703481 7110 patch_prober.go:28] interesting pod/controller-manager-757fb68448-cj9p5 container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.58:8443/healthz\": dial tcp 10.128.0.58:8443: connect: connection refused" start-of-body= Mar 13 01:17:33.703836 master-0 kubenswrapper[7110]: I0313 01:17:33.703613 7110 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-757fb68448-cj9p5" podUID="631f5719-2083-4c99-92cb-2ddc04022d86" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.58:8443/healthz\": dial tcp 10.128.0.58:8443: connect: connection refused" Mar 13 01:17:34.061604 master-0 kubenswrapper[7110]: I0313 01:17:34.061417 7110 patch_prober.go:28] interesting pod/marketplace-operator-64bf9778cb-dszg5 container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.12:8080/healthz\": dial tcp 10.128.0.12:8080: connect: connection refused" start-of-body= Mar 13 01:17:34.061604 master-0 kubenswrapper[7110]: I0313 01:17:34.061513 7110 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-64bf9778cb-dszg5" podUID="78d2cd80-23b9-426d-a7ac-1daa27668a47" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.12:8080/healthz\": dial tcp 10.128.0.12:8080: connect: connection refused" Mar 13 01:17:34.768457 master-0 kubenswrapper[7110]: I0313 01:17:34.768360 7110 patch_prober.go:28] interesting pod/openshift-config-operator-64488f9d78-bqmmf container/openshift-config-operator namespace/openshift-config-operator: Liveness probe status=failure output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" start-of-body= Mar 13 01:17:34.768457 master-0 kubenswrapper[7110]: I0313 01:17:34.768449 7110 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-config-operator/openshift-config-operator-64488f9d78-bqmmf" podUID="d56480e0-0885-41e5-a1fc-931a068fbadb" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" Mar 13 01:17:35.768182 master-0 kubenswrapper[7110]: I0313 01:17:35.768068 7110 patch_prober.go:28] interesting pod/openshift-config-operator-64488f9d78-bqmmf container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" start-of-body= Mar 13 01:17:35.768182 master-0 kubenswrapper[7110]: I0313 01:17:35.768162 7110 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-64488f9d78-bqmmf" podUID="d56480e0-0885-41e5-a1fc-931a068fbadb" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" Mar 13 01:17:38.352617 master-0 kubenswrapper[7110]: E0313 01:17:38.352555 7110 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="11.377s" Mar 13 01:17:38.355893 master-0 kubenswrapper[7110]: I0313 01:17:38.355852 7110 patch_prober.go:28] interesting pod/openshift-config-operator-64488f9d78-bqmmf container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" start-of-body= Mar 13 01:17:38.356173 master-0 kubenswrapper[7110]: I0313 01:17:38.356138 7110 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-64488f9d78-bqmmf" podUID="d56480e0-0885-41e5-a1fc-931a068fbadb" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" Mar 13 01:17:38.357554 master-0 kubenswrapper[7110]: E0313 01:17:38.357519 7110 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(f78c05e1499b533b83f091333d61f045)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="f78c05e1499b533b83f091333d61f045" Mar 13 01:17:38.606490 master-0 kubenswrapper[7110]: E0313 01:17:38.606411 7110 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(f78c05e1499b533b83f091333d61f045)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="f78c05e1499b533b83f091333d61f045" Mar 13 01:17:38.673159 master-0 kubenswrapper[7110]: E0313 01:17:38.673060 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"029d789d642119db799ad9f74a4764d435ebea90c5fcd58eb9670acf9f27e006\": container with ID starting with 029d789d642119db799ad9f74a4764d435ebea90c5fcd58eb9670acf9f27e006 not found: ID does not exist" containerID="029d789d642119db799ad9f74a4764d435ebea90c5fcd58eb9670acf9f27e006" Mar 13 01:17:38.673894 master-0 kubenswrapper[7110]: E0313 01:17:38.673709 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"578253e69f6e09bf433efeaf51fe4123dcb489a1bcfe88e292f1fbad219b25ee\": container with ID starting with 578253e69f6e09bf433efeaf51fe4123dcb489a1bcfe88e292f1fbad219b25ee not found: ID does not exist" containerID="578253e69f6e09bf433efeaf51fe4123dcb489a1bcfe88e292f1fbad219b25ee" Mar 13 01:17:38.674250 master-0 kubenswrapper[7110]: E0313 01:17:38.674048 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e6af91761c3978d4ee9c9c1a1feccd940ab86be07c53b40abdaf52c178494ea6\": container with ID starting with e6af91761c3978d4ee9c9c1a1feccd940ab86be07c53b40abdaf52c178494ea6 not found: ID does not exist" containerID="e6af91761c3978d4ee9c9c1a1feccd940ab86be07c53b40abdaf52c178494ea6" Mar 13 01:17:38.767956 master-0 kubenswrapper[7110]: I0313 01:17:38.767920 7110 patch_prober.go:28] interesting pod/openshift-config-operator-64488f9d78-bqmmf container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" start-of-body= Mar 13 01:17:38.768089 master-0 kubenswrapper[7110]: I0313 01:17:38.767982 7110 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-64488f9d78-bqmmf" podUID="d56480e0-0885-41e5-a1fc-931a068fbadb" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.19:8443/healthz\": dial tcp 10.128.0.19:8443: connect: connection refused" Mar 13 01:17:39.665814 master-0 kubenswrapper[7110]: E0313 01:17:39.665770 7110 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(f78c05e1499b533b83f091333d61f045)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="f78c05e1499b533b83f091333d61f045" Mar 13 01:17:40.675175 master-0 kubenswrapper[7110]: E0313 01:17:40.675137 7110 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(f78c05e1499b533b83f091333d61f045)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="f78c05e1499b533b83f091333d61f045" Mar 13 01:17:46.821208 master-0 kubenswrapper[7110]: E0313 01:17:46.819102 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"6b5a8fa25db81892bded208f2b2aac20234244be88b5c809ea3ce651bf11e2b3\": container with ID starting with 6b5a8fa25db81892bded208f2b2aac20234244be88b5c809ea3ce651bf11e2b3 not found: ID does not exist" containerID="6b5a8fa25db81892bded208f2b2aac20234244be88b5c809ea3ce651bf11e2b3" Mar 13 01:17:46.821208 master-0 kubenswrapper[7110]: E0313 01:17:46.819710 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"925a29571691633af51df81c409f158e86cc5df954d25c8014b22843fdfaa4d3\": container with ID starting with 925a29571691633af51df81c409f158e86cc5df954d25c8014b22843fdfaa4d3 not found: ID does not exist" containerID="925a29571691633af51df81c409f158e86cc5df954d25c8014b22843fdfaa4d3" Mar 13 01:17:46.837831 master-0 kubenswrapper[7110]: E0313 01:17:46.837759 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e3fcb49d939f028bc20635235a331a97f2b6dc3a0a1be0538871f8f8226d3dde\": container with ID starting with e3fcb49d939f028bc20635235a331a97f2b6dc3a0a1be0538871f8f8226d3dde not found: ID does not exist" containerID="e3fcb49d939f028bc20635235a331a97f2b6dc3a0a1be0538871f8f8226d3dde" Mar 13 01:17:48.893345 master-0 kubenswrapper[7110]: E0313 01:17:48.893268 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"be31ba4eddead7d8e3b0b3bdd7d2ad0690b19683156059f65f839f77219f2b2c\": container with ID starting with be31ba4eddead7d8e3b0b3bdd7d2ad0690b19683156059f65f839f77219f2b2c not found: ID does not exist" containerID="be31ba4eddead7d8e3b0b3bdd7d2ad0690b19683156059f65f839f77219f2b2c" Mar 13 01:17:48.894165 master-0 kubenswrapper[7110]: E0313 01:17:48.894077 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"cad7c2bbdec63fd94a815f3178983b29b92e2c8c43de29f46fbd59efd546835d\": container with ID starting with cad7c2bbdec63fd94a815f3178983b29b92e2c8c43de29f46fbd59efd546835d not found: ID does not exist" containerID="cad7c2bbdec63fd94a815f3178983b29b92e2c8c43de29f46fbd59efd546835d" Mar 13 01:17:48.895809 master-0 kubenswrapper[7110]: E0313 01:17:48.895756 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"3baee088b822acbc2a39af564e0c18df01758a5b84d81978b575dc62c0f21b11\": container with ID starting with 3baee088b822acbc2a39af564e0c18df01758a5b84d81978b575dc62c0f21b11 not found: ID does not exist" containerID="3baee088b822acbc2a39af564e0c18df01758a5b84d81978b575dc62c0f21b11" Mar 13 01:17:48.959048 master-0 kubenswrapper[7110]: E0313 01:17:48.958998 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"1545fdf5af39a2944f3e7cd0579f8b1db9b5985bad7e37ca2f621f8c78b0ec1c\": container with ID starting with 1545fdf5af39a2944f3e7cd0579f8b1db9b5985bad7e37ca2f621f8c78b0ec1c not found: ID does not exist" containerID="1545fdf5af39a2944f3e7cd0579f8b1db9b5985bad7e37ca2f621f8c78b0ec1c" Mar 13 01:17:48.959581 master-0 kubenswrapper[7110]: E0313 01:17:48.959539 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"57b5861649076d4e56a649be9254ede90a5119605bc661100afb7d41cc654377\": container with ID starting with 57b5861649076d4e56a649be9254ede90a5119605bc661100afb7d41cc654377 not found: ID does not exist" containerID="57b5861649076d4e56a649be9254ede90a5119605bc661100afb7d41cc654377" Mar 13 01:17:48.960068 master-0 kubenswrapper[7110]: E0313 01:17:48.960030 7110 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"663503c7edf1dab914be09ff7f72b1010d95be798f9f62497044e238bbcd049f\": container with ID starting with 663503c7edf1dab914be09ff7f72b1010d95be798f9f62497044e238bbcd049f not found: ID does not exist" containerID="663503c7edf1dab914be09ff7f72b1010d95be798f9f62497044e238bbcd049f" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.408703 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="36b2d6ee-3ae7-444b-b327-f024a8a06ab7" containerName="installer" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.408768 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="19d78757-5081-4711-992e-c8fd7891f9b7" containerName="extract-content" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.408811 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="6e0572c2-78f9-4c65-8ea0-7242236d641f" containerName="registry-server" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.408850 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="19d78757-5081-4711-992e-c8fd7891f9b7" containerName="extract-utilities" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.408885 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="9c9c1c81-eae9-4481-9870-b598deb1dcac" containerName="pruner" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.408921 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c3ae16e5-ba77-427f-b85f-5b354e7bfb9d" containerName="extract-content" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.408955 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="6e0572c2-78f9-4c65-8ea0-7242236d641f" containerName="extract-utilities" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.408992 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="47806631-9d60-4658-832d-f160f93f42ea" containerName="installer" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.409031 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="29e096ea-ca9d-477b-b0aa-1d10244d51d9" containerName="installer" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.409071 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c3ae16e5-ba77-427f-b85f-5b354e7bfb9d" containerName="registry-server" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.409113 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c3ae16e5-ba77-427f-b85f-5b354e7bfb9d" containerName="extract-utilities" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.409152 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="6e0572c2-78f9-4c65-8ea0-7242236d641f" containerName="extract-content" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.409188 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="19d78757-5081-4711-992e-c8fd7891f9b7" containerName="registry-server" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.409223 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="415ee541-898b-41d1-98b0-c5e622776590" containerName="installer" Mar 13 01:17:55.409625 master-0 kubenswrapper[7110]: E0313 01:17:55.409259 7110 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="0b3a64f4-e94f-4916-8c91-a255d987735d" containerName="installer"aggregated/unused_machine_configs_count.json0000640000000000000000000000004115154662706020143 0ustar0000000000000000{"unused_machineconfigs_count":9}config/clusteroperator/storage.json0000640000000000000000000000346615154662706016326 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"eba0bad6-d0d3-4dc2-a743-77c53b03343b","resourceVersion":"5259","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315154662706016672 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"625e582e-dd4a-4ae5-bae4-038c69e5bf9b","resourceVersion":"5399","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:37Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:13:41Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:37Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000252415154662706024674 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"a09220fd-9519-44d1-a75f-f802b67d640f","resourceVersion":"9484","generation":1,"creationTimestamp":"2026-03-13T01:07:40Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T01:14:35Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:14:36Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255615154662706023471 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"ec2ef7ad-42ec-49b2-b474-7ffebcbedca9","resourceVersion":"10103","generation":1,"creationTimestamp":"2026-03-13T01:07:40Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:17:53Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:14:35Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115154662706022054 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"266abe3a-8ee8-4a88-8ffb-e37c2f485661","resourceVersion":"9282","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:35Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:14:35Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315154662706020316 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"19a66db6-8837-4fae-8397-9877ca325f7f","resourceVersion":"794","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346215154662706022446 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"b1ad4ff3-cfa7-45c0-8a2c-1e6e57fcc272","resourceVersion":"10273","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:37Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:26Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:31Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:26Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215154662706020650 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"0cbe98a4-4299-4232-b437-b0dc45746ef7","resourceVersion":"8573","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:27Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:13Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T01:13:27Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:26Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:26Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"openshift-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415154662706015441 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"1db7e8ba-9f48-4cde-890f-3e867b0ff276","resourceVersion":"8752","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:18Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:18Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:44Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115154662706017100 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"34aeb768-f9e8-4b14-94c1-9ee26f4075e6","resourceVersion":"7012","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.34\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:05Z","reason":"AsExpected","message":"Cluster version is \"4.18.34\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:00Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003663315154662706016355 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"166c5eb0-fce5-4b85-ad55-6725d7ae9f0b","resourceVersion":"10114","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-13T01:12:08Z"},{"type":"Degraded","status":"True","lastTransitionTime":"2026-03-13T01:17:53Z","reason":"BootstrapError","message":"Internal error while reconciling platform networking resources: failed to get machine config cluster operator: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io machine-config)"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:11:57Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:38Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:13:22Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715154662706017044 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"7a5ac4f8-013b-443f-9033-42796d020ff7","resourceVersion":"9266","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-13T01:14:35Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T01:14:35Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:14:35Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315154662706017141 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"a96026c6-0b41-4af6-a635-ce30e8a22a3b","resourceVersion":"9362","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:36Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.34"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:36Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:14:36Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:36Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000437315154662706017527 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"a3e02945-7df4-467e-810c-e515b073846a","resourceVersion":"9764","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T01:14:25Z","message":"Working towards 4.18.34"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:39Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:25Z","reason":"AsExpected","message":"Cluster has deployed []"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:14:25Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-13T01:14:25Z","reason":"AsExpected"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{}}}config/clusteroperator/machine-approver.json0000640000000000000000000000146715154662706020121 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"ed1f534d-e0ac-4e26-b831-2291cbe3f04e","resourceVersion":"688","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000263415154662706017031 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"375c9761-c1e2-4323-97e2-9791db93d041","resourceVersion":"756","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","name":""},{"group":"machine.openshift.io","resource":"machinesets","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddresses","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddressclaims","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315154662706022551 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"6261fdee-0aab-4c0d-9859-f397ca4cae81","resourceVersion":"5170","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:34Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:13:38Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:13:38Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:34Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:34Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615154662706017561 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"b9c639c2-7dff-439f-8bfd-51f908ca82f8","resourceVersion":"9156","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:27Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T01:13:43Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 6"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T01:13:27Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 6"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:27Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:26Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000001275415154662706021401 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"dfc19b88-72ec-4721-9497-13c41af0474b","resourceVersion":"10111","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:27Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 3:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:37.338157 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380492 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:37.380551 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.380562 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:37.455229 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:07.455847 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:21.457056 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nTargetConfigControllerDegraded: \"configmap\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps config)\nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets serving-cert)"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T01:14:00Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T01:13:28Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:27Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:27Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000001310415154662706017574 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"6dc2ae16-71a7-45c5-bc17-dd91b1820987","resourceVersion":"10285","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:13Z","reason":"AsExpected","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0313 01:14:36.757951 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766564 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0313 01:14:36.766617 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.833816 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0313 01:14:36.837090 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0313 01:15:06.838694 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0313 01:15:20.842871 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T01:14:22Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T01:13:14Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:13Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415154662706016501 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"0ef45f43-1d27-4931-9b1b-9be34e49b4f6","resourceVersion":"841","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715154662706016337 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"b8da74b7-9d5a-4508-9feb-37e4cfd7f691","resourceVersion":"6890","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:02Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:02Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715154662706017604 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"ddc1da8f-edf6-455c-89f6-0251eab317ad","resourceVersion":"715","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015154662706015576 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"caf1f3c5-6b96-4ace-82c1-2724980f4789","resourceVersion":"7021","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T01:14:05Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T01:13:40Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:39Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515154662706015446 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"4766a578-5abd-4391-978d-69c0c6446971","resourceVersion":"8912","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:26Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:26Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715154662706021450 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"7275faf7-2785-4e6a-83d6-d839a00e2e6f","resourceVersion":"6043","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:13:49Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:13:49Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"csi-snapshot-controller","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263615154662706021630 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"b73d4e23-f7e3-4cc5-a599-1a79230a5fb6","resourceVersion":"10097","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:17:51Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:17:51Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:17:51Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:17:51Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215154662706016310 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"5c4669c8-414e-4ef0-b639-76a4892a1a3c","resourceVersion":"704","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615154662706017750 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"cce3ba6c-6607-40a7-9b59-134a47696d13","resourceVersion":"4566","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:29Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:13:29Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:13:29Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:29Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:29Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000164415154662706020477 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"92d417f8-ca4e-4440-b663-8c1db14864e1","resourceVersion":"838","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","name":""},{"group":"autoscaling.openshift.io","resource":"machineautoscalers","name":""}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000001520715154662706020074 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"c1a6d324-2cce-4de3-bcf4-216227ea14c1","resourceVersion":"1955","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:07:48Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:07:48Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:07:48Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:07:48Z"}],"versions":[{"name":"operator","version":""}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715154662706021560 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"b319fd96-f5fd-4b05-9570-289cb3e1683c","resourceVersion":"692","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015154662706016610 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"85e04fa3-1167-4091-a992-1d0fa4ab819b","resourceVersion":"6624","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:00Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:00Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:00Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:14:00Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-13T01:14:00Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000773215154662706017701 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"f88dd189-fa2e-4459-a13d-95255ecafa7c","resourceVersion":"8199","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:13:35Z","reason":"AsExpected","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.117.27:443/healthz\": dial tcp 172.30.117.27:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-13T01:14:15Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T01:13:35Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.117.27:443/healthz\": dial tcp 172.30.117.27:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-13T01:13:35Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-13T01:13:35Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"oauth-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515154662706023231 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115154662706025441 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715154662706025150 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715154662706025141 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315154662706022261 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515154662706026715 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115154662706023420 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115154662706023214 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115154662706025504 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/pod/openshift-cluster-version/cluster-version-operator-8c9c967c7-4d6fw.json0000640000000000000000000001350415154662706026533 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-8c9c967c7-4d6fw","generateName":"cluster-version-operator-8c9c967c7-","namespace":"openshift-cluster-version","uid":"85149f21-7ba8-4891-82ef-0fef3d5d7863","resourceVersion":"8628","creationTimestamp":"2026-03-13T01:14:16Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"8c9c967c7"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-8c9c967c7","uid":"d5103fc5-d68d-4934-85cd-00a393e005af","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"imagePullSecrets":[{"name":"default-dockercfg-5qbrz"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:16Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:16Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:16Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T01:14:16Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-13T01:14:16Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","containerID":"cri-o://2e8d9bdcd6f94bc5d59dda8365233249d91bac104c7683389de5c7d81691e53d","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415154662706011036 0ustar00000000000000008f65c0d6-ab65-48d8-897f-7de4dbfac1bfconfig/version.json0000640000000000000000000000743015154662706013105 0ustar0000000000000000{"metadata":{"name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","resourceVersion":"9902","generation":2,"creationTimestamp":"2026-03-13T01:07:14Z"},"spec":{"clusterID":"8f65c0d6-ab65-48d8-897f-7de4dbfac1bf","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","url":"https://access.redhat.com/errata/RHSA-2026:2977","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-13T01:07:39Z","completionTime":null,"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","verified":false}],"observedGeneration":2,"versionHash":"p13mOMOOYQo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-13T01:07:39Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-13T01:07:39Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-13T01:07:39Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-13T01:07:39Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-13T01:07:39Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-13T01:17:40Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, cluster-autoscaler, control-plane-machine-set, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-approver, marketplace, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver are not available\n* Could not update clusterrole \"machine-api-operator:cluster-reader\" (225 of 908)\n* Could not update deployment \"openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager\" (167 of 908)\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-13T01:07:39Z","reason":"MultipleErrors","message":"Unable to apply 4.18.34: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715154662706017547 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-13T01:14:00Z","not_after":"2028-03-12T01:14:01Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-13T01:14:01Z","not_after":"2028-03-12T01:14:02Z","controllers":[]}]config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315154662706023456 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"d35688f1-1c97-4382-9c03-b3ae029820bf","resourceVersion":"5764","generation":1,"creationTimestamp":"2026-03-13T01:13:45Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015154662706022061 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"ca649587-b478-4cb9-94e8-9e07accf450b","resourceVersion":"5732","generation":1,"creationTimestamp":"2026-03-13T01:13:45Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-13T01:13:45Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615154662706025514 0ustar0000000000000000{"metadata":{"name":"edit","uid":"1ea22972-f239-43e3-9525-d1bd60005124","resourceVersion":"7261","creationTimestamp":"2026-03-13T01:06:15Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315154662706025655 0ustar0000000000000000{"metadata":{"name":"admin","uid":"224f7402-03ab-462a-a044-4f78b088bd82","resourceVersion":"7269","creationTimestamp":"2026-03-13T01:06:15Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/running_containers.json0000640000000000000000000001017315154662706015323 0ustar0000000000000000{"images":{"0":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","1":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","10":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","11":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","12":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","13":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","14":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","15":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","16":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","17":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","18":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","19":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","2":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","20":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","21":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","22":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","23":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","24":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","25":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","26":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","27":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","28":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","29":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","3":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","30":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","31":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","32":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","33":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","34":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","35":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","36":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","37":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","38":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","39":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","4":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","40":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","41":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","42":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","43":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","44":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","45":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","46":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","47":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","48":"registry.redhat.io/redhat/certified-operator-index:v4.18","5":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","6":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","7":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","8":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","9":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba"},"containers":{"2026-03":{"0":12,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":1,"19":1,"2":6,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":5,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"5":3,"6":3,"7":2,"8":2,"9":2}}}operator-controller-controller-manager-6598bfb6c4-2wh5w.json0000640000000000000000000002474415154662706032322 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-6598bfb6c4-2wh5w","generateName":"operator-controller-controller-manager-6598bfb6c4-","namespace":"openshift-operator-controller","uid":"30a7d5de-1ca1-46c8-8fbb-f34e4e2358d3","resourceVersion":"9851","creationTimestamp":"2026-03-13T01:13:54Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"6598bfb6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.42/23\"],\"mac_address\":\"0a:58:0a:80:00:2a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.42/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.42\"\n ],\n \"mac\": \"0a:58:0a:80:00:2a\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-6598bfb6c4","uid":"2e26821e-bba7-4670-80a7-db36d499945e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-6v79j","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-6v79j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-6v79j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.42","podIPs":[{"ip":"10.128.0.42"}],"startTime":"2026-03-13T01:13:54Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-13T01:14:01Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://c51cdc52a7907953fa7b2f33b8d5256b59068c681441b3e967443332162a6acd","started":true,"volumeMounts":[{"name":"kube-api-access-6v79j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-13T01:16:53Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"fdbd75d3-33ae-43a3-9102-b041f4c89e09\"\nI0313 01:14:33.522895 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"fdbd75d3-33ae-43a3-9102-b041f4c89e09\"\nI0313 01:14:33.522974 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"242fb150-1325-4a76-a0fc-9809ca7fc0b1\"\nI0313 01:14:33.523011 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"242fb150-1325-4a76-a0fc-9809ca7fc0b1\"\nE0313 01:15:27.220050 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0313 01:16:27.221856 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0313 01:16:40.216493 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0313 01:16:40.216707 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-13T01:14:01Z","finishedAt":"2026-03-13T01:16:40Z","containerID":"cri-o://5c71af40ce92aac85f827794e9d207c4ed4bc300599f6601dc56da9d0a8b0d8b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","containerID":"cri-o://7ef67c4dbd8426a3e3af7aa349a5cbaefed2fde80e4c7f48ba81fe002ea31f34","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-6v79j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215154662706026266 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"c627b988-cd09-44a6-9c35-aa1303248941","resourceVersion":"4093","creationTimestamp":"2026-03-13T01:11:42Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.mirror":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.seen":"2026-03-13T01:11:02.521490259Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c49bf4d8-4e43-40fb-93c2-f084fdfa1bba","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-13T01:13:19Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T01:11:06Z","finishedAt":"2026-03-13T01:11:06Z","containerID":"cri-o://ef509e1db76d33faa725783e475ec527d0db77ed62b28bc3717960d043c585e4"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://ef509e1db76d33faa725783e475ec527d0db77ed62b28bc3717960d043c585e4","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-13T01:11:54Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0313 01:11:27.050317 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0313 01:11:27.050509 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0313 01:11:27.052002 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-13T01:11:27Z","finishedAt":"2026-03-13T01:11:27Z","containerID":"cri-o://66d7d7db2b542e86a40857789246d4abcbc4fca4d74d92d6366f9e8e1aa401b5"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://c03513c285f73dedbe67dedcdcf65f9b9e4e6c146f0a64e7433f278ca1844469","started":true}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/cluster-baremetal-operator-5cdb4c5598-47sjr.json0000640000000000000000000002437415154662706026170 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-operator-5cdb4c5598-47sjr","generateName":"cluster-baremetal-operator-5cdb4c5598-","namespace":"openshift-machine-api","uid":"8c6bf2d5-1881-4b63-b247-7e7426707fa1","resourceVersion":"9882","creationTimestamp":"2026-03-13T01:11:37Z","labels":{"k8s-app":"cluster-baremetal-operator","pod-template-hash":"5cdb4c5598"},"annotations":{"capability.openshift.io/name":"baremetal","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.5/23\"],\"mac_address\":\"0a:58:0a:80:00:05\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.5/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.5\"\n ],\n \"mac\": \"0a:58:0a:80:00:05\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-baremetal-operator-5cdb4c5598","uid":"38c67fbc-c00d-400e-b7cd-43436b1ac1c6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-baremetal-webhook-server-cert","defaultMode":420}},{"name":"config","configMap":{"name":"baremetal-kube-rbac-proxy","defaultMode":420}},{"name":"cluster-baremetal-operator-tls","secret":{"secretName":"cluster-baremetal-operator-tls","defaultMode":420}},{"name":"images","configMap":{"name":"cluster-baremetal-operator-images","defaultMode":420}},{"name":"kube-api-access-vxf58","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-baremetal-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","command":["/usr/bin/cluster-baremetal-operator"],"args":["--enable-leader-election"],"ports":[{"name":"webhook-server","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/tls"},{"name":"images","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/images"},{"name":"kube-api-access-vxf58","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"baremetal-kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--config-file=/etc/baremetal-kube-rbac-proxy/config-file.yaml","--logtostderr=true","--v=10"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-vxf58","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-baremetal-operator","serviceAccount":"cluster-baremetal-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c9"},"runAsUser":65534,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:00Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.5","podIPs":[{"ip":"10.128.0.5"}],"startTime":"2026-03-13T01:13:10Z","containerStatuses":[{"name":"baremetal-kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-13T01:14:00Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://81594a611904e6b6b1a33993523b7420d7c605395323b0ff7a70b4475e6f0b5c","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-vxf58","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"cluster-baremetal-operator","state":{"running":{"startedAt":"2026-03-13T01:17:38Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.DaemonSet\"\nI0313 01:14:00.798969 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.ClusterOperator\"\nI0313 01:14:00.798981 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.Proxy\"\nI0313 01:14:00.798994 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1beta1.Machine\"\nI0313 01:14:00.799005 1 controller.go:181] \"msg\"=\"Starting Controller\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\"\nI0313 01:14:01.037173 1 controller.go:215] \"msg\"=\"Starting workers\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"worker count\"=1\nE0313 01:15:26.853097 1 leaderelection.go:340] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0313 01:16:26.856120 1 leaderelection.go:347] error retrieving resource lock openshift-machine-api/cluster-baremetal-operator: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-baremetal-operator)\nI0313 01:16:39.846625 1 leaderelection.go:285] failed to renew lease openshift-machine-api/cluster-baremetal-operator: timed out waiting for the condition\nE0313 01:17:13.854091 1 leaderelection.go:308] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nE0313 01:17:13.854242 1 main.go:182] \"problem running manager\" err=\"leader election lost\"\n","startedAt":"2026-03-13T01:14:00Z","finishedAt":"2026-03-13T01:17:13Z","containerID":"cri-o://4f6218cc31120287103af84277d2f84084c2bfa51936dccb9cf930aa141d948d"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","containerID":"cri-o://3ae103f8a6f884755c35a6a16f2094f5be91f7ff8edc4b19322c844eaa733963","started":true,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-baremetal-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"images","mountPath":"/etc/cluster-baremetal-operator/images","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-vxf58","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-677db989d6-kdn2l.json0000640000000000000000000002431415154662706025350 0ustar0000000000000000{"metadata":{"name":"ingress-operator-677db989d6-kdn2l","generateName":"ingress-operator-677db989d6-","namespace":"openshift-ingress-operator","uid":"70c097a1-90d9-4344-b0ae-5a59ec2ad8ad","resourceVersion":"9853","creationTimestamp":"2026-03-13T01:11:36Z","labels":{"name":"ingress-operator","pod-template-hash":"677db989d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-677db989d6","uid":"3bd8ea30-426d-4f98-a835-ef67a594b63e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-29w76","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-29w76","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-29w76","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-03-13T01:13:10Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-13T01:16:53Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNS ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-13T01:16:01.360Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\nW0313 01:16:01.360428 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-13T01:16:01.361Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\nW0313 01:16:01.360521 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Pod ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0313 01:16:01.360616 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Role ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0313 01:16:01.360788 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.RoleBinding ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-13T01:16:01.361Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-03-13T01:16:01.361Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n2026-03-13T01:16:01.361Z\tERROR\toperator.init\truntime/asm_amd64.s:1695\terror stopping metrics listener\n","startedAt":"2026-03-13T01:14:00Z","finishedAt":"2026-03-13T01:16:01Z","containerID":"cri-o://bb00bc21a2b9f11b41d1750186297e3a5ca651c2efe8531d5b69fd560b0ba268"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","containerID":"cri-o://71f9d1850bad5c508f54de1c0bfe33c2b618025214e8583b970eda19de8409dc","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-29w76","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-13T01:14:00Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://e7ab97f2a4c561db63cb663455e603d6ca1f98998fa007e41050f6e9e2778659","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-29w76","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-8565d84698-sslxh.json0000640000000000000000000002046215154662706033520 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8565d84698-sslxh","generateName":"openshift-controller-manager-operator-8565d84698-","namespace":"openshift-controller-manager-operator","uid":"039acb44-a9b3-4ad6-a091-be4d18edc34f","resourceVersion":"9672","creationTimestamp":"2026-03-13T01:11:36Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8565d84698"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8565d84698","uid":"8936f61e-1dec-4b5a-bb54-8ca0571c3b96","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-kkdbm","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-kkdbm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c10"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2026-03-13T01:13:10Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-13T01:14:37Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":" event.go:377] Event(v1.ObjectReference{Kind:\"Deployment\", Namespace:\"openshift-controller-manager-operator\", Name:\"openshift-controller-manager-operator\", UID:\"40243101-9cb2-485a-827f-5c995a30f6c8\", APIVersion:\"apps/v1\", ResourceVersion:\"\", FieldPath:\"\"}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/openshift-controller-manager version \"operator\" changed from \"\" to \"4.18.34\"\nE0313 01:14:26.882116 1 base_controller.go:279] \"Unhandled Error\" err=\"StatusSyncer_openshift-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \\\"openshift-controller-manager\\\": the object has been modified; please apply your changes to the latest version and try again\"\nI0313 01:14:36.224919 1 observer_polling.go:111] Observed file \"/var/run/secrets/serving-cert/tls.crt\" has been created (hash=\"6877c9a494cb1c3df1efdaef96f536477079b42b821c2039b93e12bdd38d34db\")\nW0313 01:14:36.224971 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created\nI0313 01:14:36.225028 1 observer_polling.go:111] Observed file \"/var/run/secrets/serving-cert/tls.key\" has been created (hash=\"b22eacce5f10d08b9089bab2a51b756e359aa9b8971942c0cd28278e72d7e0f9\")\nI0313 01:14:36.225103 1 genericapiserver.go:691] \"[graceful-termination] pre-shutdown hooks completed\" name=\"PreShutdownHooksStopped\"\nI0313 01:14:36.225133 1 genericapiserver.go:546] \"[graceful-termination] shutdown event\" name=\"ShutdownInitiated\"\nI0313 01:14:36.225156 1 object_count_tracker.go:151] \"StorageObjectCountTracker pruner is exiting\"\nI0313 01:14:36.225489 1 base_controller.go:181] Shutting down UserCAObservationController ...\nI0313 01:14:36.225510 1 base_controller.go:181] Shutting down ImagePullSecretCleanupController ...\nI0313 01:14:36.225706 1 operator.go:151] Shutting down OpenShiftControllerManagerOperator\nW0313 01:14:36.225846 1 builder.go:136] graceful termination failed, controllers failed with error: stopped\n","startedAt":"2026-03-13T01:13:25Z","finishedAt":"2026-03-13T01:14:36Z","containerID":"cri-o://757884fd1e54a4728f490aa384fee80c41466484bac2e993d7373c9b6d19ad0a"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","containerID":"cri-o://3ad76288e23214748b66d20552278056bf77691ab910aa1096214002b1b63ee0","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-kkdbm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-config-operator/openshift-config-operator-64488f9d78-bqmmf.json0000640000000000000000000002142015154662706026740 0ustar0000000000000000{"metadata":{"name":"openshift-config-operator-64488f9d78-bqmmf","generateName":"openshift-config-operator-64488f9d78-","namespace":"openshift-config-operator","uid":"d56480e0-0885-41e5-a1fc-931a068fbadb","resourceVersion":"9907","creationTimestamp":"2026-03-13T01:11:38Z","labels":{"app":"openshift-config-operator","pod-template-hash":"64488f9d78"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-config-operator-64488f9d78","uid":"96267dfd-32b6-49d8-a7de-91dabb8f8f0a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"config-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"available-featuregates","emptyDir":{"sizeLimit":"100Mi"}},{"name":"kube-api-access-fppkf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"openshift-api","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","command":["write-available-featuresets","--asset-output-dir=/available-featuregates","--payload-version=$(OPERATOR_IMAGE_VERSION)"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-fppkf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"containers":[{"name":"openshift-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","command":["cluster-config-operator","operator","--operator-version=$(OPERATOR_IMAGE_VERSION)","--authoritative-feature-gate-dir=/available-featuregates"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-fppkf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-config-operator","serviceAccount":"openshift-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:12Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-03-13T01:13:10Z","initContainerStatuses":[{"name":"openshift-api","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-13T01:13:25Z","finishedAt":"2026-03-13T01:13:25Z","containerID":"cri-o://77742db3e18b710fed8057a5ff63f6e99d45794674fb37f85d739e62dd3a751e"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","containerID":"cri-o://77742db3e18b710fed8057a5ff63f6e99d45794674fb37f85d739e62dd3a751e","started":false,"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-fppkf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"openshift-config-operator","state":{"running":{"startedAt":"2026-03-13T01:17:39Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0313 01:16:53.314190 1 cmd.go:250] Using service-serving-cert provided certificates\nI0313 01:16:53.314834 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0313 01:16:53.316018 1 observer_polling.go:159] Starting file observer\nI0313 01:17:38.363291 1 builder.go:298] config-operator version 4.18.0-202602132343.p2.gfe5e928.assembly.stream.el9-fe5e928-fe5e928628200b49a07aa50e4dfa634fb9452607\nI0313 01:17:38.364860 1 cmd.go:138] Received SIGTERM or SIGINT signal, shutting down controller.\nF0313 01:17:38.595599 1 cmd.go:179] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-03-13T01:16:53Z","finishedAt":"2026-03-13T01:17:38Z","containerID":"cri-o://09062ce5a8bfb21fa147439adb4aa83615da8c3397079fc199132224f09f0600"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","containerID":"cri-o://d06826ec4775f3b8e7bc8c8c50364ebde1bf5d008653ef1eefd79f82a03cb948","started":true,"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-fppkf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-2slj5.json0000640000000000000000000001401415154662706030063 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-7577d6f48-2slj5","generateName":"csi-snapshot-controller-7577d6f48-","namespace":"openshift-cluster-storage-operator","uid":"3d2e7338-a6d6-4872-ab72-a4e631075ab3","resourceVersion":"9885","creationTimestamp":"2026-03-13T01:13:45Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"7577d6f48"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.38/23\"],\"mac_address\":\"0a:58:0a:80:00:26\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.38/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.38\"\n ],\n \"mac\": \"0a:58:0a:80:00:26\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-7577d6f48","uid":"08de9df6-0943-4aa4-81e0-56dcf13a64e9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-vkgvg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-vkgvg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000160000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsNonRoot":true,"fsGroup":1000160000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:49Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:45Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:45Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.38","podIPs":[{"ip":"10.128.0.38"}],"startTime":"2026-03-13T01:13:45Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-13T01:17:38Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0313 01:16:53.284082 1 feature_gate.go:387] feature gates: {map[]}\nI0313 01:16:53.284332 1 main.go:169] Version: a3681c9bbf7c01e13d6bf97ae0384460950c97ec\nI0313 01:16:53.286247 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0313 01:17:23.296816 1 main.go:98] Failed to list v1 volumesnapshots with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshots?limit=1\": context deadline exceeded\nE0313 01:17:23.296867 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-03-13T01:16:53Z","finishedAt":"2026-03-13T01:17:23Z","containerID":"cri-o://63acc12abb985dff806c0ddcd9c27446b325df44a94150a2e781b1a28ec52869"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","containerID":"cri-o://9c9bcd7c0bc2c0a8bdfb783091d79282cb414b9c8007f3f521bcaba6d62d5459","started":true,"volumeMounts":[{"name":"kube-api-access-vkgvg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-7fc8j.json0000640000000000000000000002537715154662706025736 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-7f8b8b6f4c-7fc8j","generateName":"catalogd-controller-manager-7f8b8b6f4c-","namespace":"openshift-catalogd","uid":"2c4c579b-0643-47ac-a729-017c326b0ecc","resourceVersion":"9865","creationTimestamp":"2026-03-13T01:13:54Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"7f8b8b6f4c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.41/23\"],\"mac_address\":\"0a:58:0a:80:00:29\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.41/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.41\"\n ],\n \"mac\": \"0a:58:0a:80:00:29\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-7f8b8b6f4c","uid":"f77ad46c-3643-4b19-b938-602974350459","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-g44dw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-g44dw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-g44dw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:14:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:17:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-13T01:13:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.41","podIPs":[{"ip":"10.128.0.41"}],"startTime":"2026-03-13T01:13:54Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-13T01:14:03Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://dafd5daeb5af37ce7ca2009d2230447bde3ffe690f871d4715ff864e7f41bbd6","started":true,"volumeMounts":[{"name":"kube-api-access-g44dw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-13T01:17:27Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"shift-redhat-operators\" reconcileID=\"1ca431e8-f20f-42d4-9f38-08885d6d12fc\" layer=0\nI0313 01:16:14.562722 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"1ca431e8-f20f-42d4-9f38-08885d6d12fc\" layer=1\nI0313 01:16:14.735565 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"1ca431e8-f20f-42d4-9f38-08885d6d12fc\" layer=2\nI0313 01:16:17.235610 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"1ca431e8-f20f-42d4-9f38-08885d6d12fc\" layer=3\nI0313 01:16:20.245841 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"1ca431e8-f20f-42d4-9f38-08885d6d12fc\" layer=4\nE0313 01:16:30.460944 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0313 01:16:43.453464 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0313 01:16:43.453581 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-13T01:14:03Z","finishedAt":"2026-03-13T01:16:44Z","containerID":"cri-o://123227ec95c803688ea3b73355951521f6c2e9af5b64fd2cfda9372aa3bb75d9"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","containerID":"cri-o://dbffdb32298050e3d786bea05b0e0e1b7922cd3d84a8dd8e9be8f2f907195c49","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-g44dw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115154662706025310 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"4d135140-65c8-4c6f-9607-2dbf61b06c13","resourceVersion":"5512","generation":2,"creationTimestamp":"2026-03-13T01:08:05Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515154662706026747 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"1ea42eaf-9610-4317-b6c5-68034e25584b","resourceVersion":"8119","generation":1,"creationTimestamp":"2026-03-13T01:14:14Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"39128195-b05a-4bfe-b12c-5db14f567df0","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715154662706024035 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"9208603d-b0ff-4b0d-814f-afa86fbe8240","resourceVersion":"5511","generation":2,"creationTimestamp":"2026-03-13T01:12:11Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"39128195-b05a-4bfe-b12c-5db14f567df0","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315154662706030650 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"4133ff4b-4643-44bb-ac76-d15ba25fe26a","resourceVersion":"10279","generation":2,"creationTimestamp":"2026-03-13T01:17:56Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115154662706032120 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"2d71d4aa-6c15-4ed8-a8dc-290065c76f8f","resourceVersion":"6641","generation":2,"creationTimestamp":"2026-03-13T01:14:00Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615154662706027512 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"129e7d71-52be-47d5-b4b3-702168054bb8","resourceVersion":"6130","generation":2,"creationTimestamp":"2026-03-13T01:13:51Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000174015154662706025130 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"5ef98b8c-ebd5-4213-9976-0eb133ee9926","resourceVersion":"9626","generation":1,"creationTimestamp":"2026-03-13T01:07:57Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2026-03-13T01:07:57Z","reason":"InsufficientPods","message":""}]}}config/authentication.json0000640000000000000000000000116515154662706014436 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5a85c76e-8075-41c8-af7c-9dbf47d9ccf6","resourceVersion":"1154","generation":1,"creationTimestamp":"2026-03-13T01:07:47Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}events/openshift-machine-api.json0000640000000000000000000001442515154662706015631 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T01:08:12Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-5cdb4c5598-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T01:11:35Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-5cdb4c5598-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T01:11:37Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T01:13:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T01:13:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T01:13:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T01:13:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T01:15:40Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-autoscaler-operator-69576476f7-2q4qb_openshift-machine-api_d278ed70-786c-4b6c-9f04-f08ede704569_0(60187c25e4e16464ae34b3090edfd02e68d1304701b069bf6e190b8103302662): error adding pod openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"60187c25e4e16464ae34b3090edfd02e68d1304701b069bf6e190b8103302662\" Netns:\"/var/run/netns/cf2887f3-a006-49fc-895f-ae73b85943e6\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=cluster-autoscaler-operator-69576476f7-2q4qb;K8S_POD_INFRA_CONTAINER_ID=60187c25e4e16464ae34b3090edfd02e68d1304701b069bf6e190b8103302662;K8S_POD_UID=d278ed70-786c-4b6c-9f04-f08ede704569\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/cluster-autoscaler-operator-69576476f7-2q4qb] networking: Multus: [openshift-machine-api/cluster-autoscaler-operator-69576476f7-2q4qb/d278ed70-786c-4b6c-9f04-f08ede704569]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-autoscaler-operator-69576476f7-2q4qb in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-autoscaler-operator-69576476f7-2q4qb in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/cluster-autoscaler-operator-69576476f7-2q4qb?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-13T01:16:42Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-autoscaler-operator-69576476f7-2q4qb_openshift-machine-api_d278ed70-786c-4b6c-9f04-f08ede704569_0(18da12c9e3e7024082299762be3734cb8dcb2be9b756bb3c695481369bee2d02): error adding pod openshift-machine-api_cluster-autoscaler-operator-69576476f7-2q4qb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"18da12c9e3e7024082299762be3734cb8dcb2be9b756bb3c695481369bee2d02\" Netns:\"/var/run/netns/16176860-1f22-48ce-8af2-6d4bc2a413ca\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=cluster-autoscaler-operator-69576476f7-2q4qb;K8S_POD_INFRA_CONTAINER_ID=18da12c9e3e7024082299762be3734cb8dcb2be9b756bb3c695481369bee2d02;K8S_POD_UID=d278ed70-786c-4b6c-9f04-f08ede704569\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/cluster-autoscaler-operator-69576476f7-2q4qb] networking: Multus: [openshift-machine-api/cluster-autoscaler-operator-69576476f7-2q4qb/d278ed70-786c-4b6c-9f04-f08ede704569]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-autoscaler-operator-69576476f7-2q4qb in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-autoscaler-operator-69576476f7-2q4qb in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/cluster-autoscaler-operator-69576476f7-2q4qb?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"}]}config/apiserver.json0000640000000000000000000000121615154662706013414 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"23b929ba-731b-48b9-94fe-ea35592e5069","resourceVersion":"755","generation":1,"creationTimestamp":"2026-03-13T01:07:39Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/image.json0000640000000000000000000000111715154662706012476 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"17f8b665-c75f-4103-89cc-00e657a79a97","resourceVersion":"1437","generation":1,"creationTimestamp":"2026-03-13T01:07:54Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/infrastructure.json0000640000000000000000000000106515154662706014476 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a22a2099-9562-4352-a76e-19bb386c83d6","resourceVersion":"543","generation":1,"creationTimestamp":"2026-03-13T01:07:08Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115154662706027762 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"03ebed00-70a7-49f4-9537-b52f7ee8c6f2","resourceVersion":"6775","generation":1,"creationTimestamp":"2026-03-13T01:14:00Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-13T01:14:01Z","reason":"AsExpected"}]}}config/schedulers/cluster.json0000640000000000000000000000052415154662706015237 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"636af933-150c-47ed-ac95-1cf2dd08315d","resourceVersion":"566","generation":1,"creationTimestamp":"2026-03-13T01:07:11Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/proxy.json0000640000000000000000000000031315154662706012572 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d1b38867-784f-4cdc-86d9-7fb0459e439a","resourceVersion":"560","generation":1,"creationTimestamp":"2026-03-13T01:07:10Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/featuregate.json0000640000000000000000000000613615154662706013716 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"8290258c-d225-4311-a0c1-2c3c6aa0d1cf","resourceVersion":"650","generation":1,"creationTimestamp":"2026-03-13T01:07:30Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.34","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215154662706020210 0ustar0000000000000000[]config/machineconfigpools/worker.json0000640000000000000000000000106515154662706016576 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-13T01:14:39Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"9767","uid":"b99f87fa-290e-414f-ad69-dda11fdb508b"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117215154662706016557 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-13T01:14:39Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"9766","uid":"66485bbc-abb4-46e9-807b-76714491212b"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/network.json0000640000000000000000000000117015154662706013104 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6327b0f5-5360-490f-9c79-fb8f37a23309","resourceVersion":"3364","generation":2,"creationTimestamp":"2026-03-13T01:07:10Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/oauth.json0000640000000000000000000000114415154662706012534 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"2c95d53d-2385-4d75-b600-892c9dc683ee","resourceVersion":"1648","generation":1,"creationTimestamp":"2026-03-13T01:07:57Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"ff763316-be2a-4177-b499-8245de9bf07d"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/ingress.json0000640000000000000000000000043615154662706013071 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0959d757-960a-4239-8aab-f5f7fe3be9f6","resourceVersion":"557","generation":1,"creationTimestamp":"2026-03-13T01:07:09Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/node/master-0.json0000640000000000000000000000551415154662706013776 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"c49bf4d8-4e43-40fb-93c2-f084fdfa1bba","resourceVersion":"9905","creationTimestamp":"2026-03-13T01:11:36Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865360Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714384Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-13T01:17:43Z","lastTransitionTime":"2026-03-13T01:11:36Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-13T01:17:43Z","lastTransitionTime":"2026-03-13T01:11:36Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-13T01:17:43Z","lastTransitionTime":"2026-03-13T01:11:36Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-13T01:17:43Z","lastTransitionTime":"2026-03-13T01:13:09Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.111.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602172219-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}