insights-operator/gathers.json0000640000000000000000000003506115153371034015260 0ustar0000000000000000{"status_reports":[{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":16477,"records_count":159,"errors":["function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"support_secret\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"silenced_alerts\" failed with an error","function \"active_alerts\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bh88w.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":36,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":53,"records_count":11,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":181,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":72,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10902,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11604,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":24,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":158,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":204,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":17,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":93,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":54,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":16461,"records_count":64,"errors":["the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bh88w.json\" was already recorded and had the fingerprint \"17ac09c5d287a14d5dda8b2a9f4f80cd2a8959a50753ee0f3df8b385678ca299\", overwriting with the record having fingerprint \"17ac09c5d287a14d5dda8b2a9f4f80cd2a8959a50753ee0f3df8b385678ca299\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_previous.log\" was already recorded and had the fingerprint \"b7e21c4e652b673190273eb45ea5cc20fc46fb12acc3f96588aae6fb72d782cd\", overwriting with the record having fingerprint \"b7e21c4e652b673190273eb45ea5cc20fc46fb12acc3f96588aae6fb72d782cd\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_current.log\" was already recorded and had the fingerprint \"ff4f2376599a21a492b0973165b8b0d044da8b41f2bd92ff4c0d81b62a2d3133\", overwriting with the record having fingerprint \"ff4f2376599a21a492b0973165b8b0d044da8b41f2bd92ff4c0d81b62a2d3133\""],"warnings":["warning: the record with the same fingerprint \"17ac09c5d287a14d5dda8b2a9f4f80cd2a8959a50753ee0f3df8b385678ca299\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bh88w.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bh88w.json\"","warning: the record with the same fingerprint \"b7e21c4e652b673190273eb45ea5cc20fc46fb12acc3f96588aae6fb72d782cd\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"ff4f2376599a21a492b0973165b8b0d044da8b41f2bd92ff4c0d81b62a2d3133\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_current.log\""],"panic":null},{"name":"clusterconfig/operators","duration_in_ms":97,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5842,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":6,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":37,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":72,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5843,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":36,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":51,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":34,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":26,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":54,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":46,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":58,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":62,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":29,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":37,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":13,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":34,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":22.975,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515153371034017764 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515153371034021066 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005536115153371033014250 0ustar0000000000000000{"pods":81,"imageCount":68,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:063b8972231e65eb43f6545ba37804f68138dc54d97b91a652a1c5bc7dc76aa5","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:82ad8d62d92a8cc5e2391e3b0746219bd740cc26741bc7571010d337240fa112","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:e0c034ae18daa01af8d073f8cc24ae4af87883c664304910eab1167fdfd60c0b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:ae042a5d32eb2f18d537f2068849e665b55df7d8360daedaaeea98bd2a79e769","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"terminalCount":1,"shapes":[]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":7,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3ef4b76f6b989bf3e802d22aff457a019d9c232f0ea8d927ac6ce2d854fe48d7","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:243ce0f08a360370edf4960aec94fc6c5be9d4aae26cf8c5320adcd047c1b14f","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:bececf32872455775075a3d35100302396ca58ae29827b24d7df086d8ac14432","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bedf16a5f527126e934c37d2f24886de4a54c9bd9d45b18821d02eefd8b5f9e","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:bc516f6eb3028f5169f1712ac1878d4b591174fd7c363f4ee5aa63162aa01b0e","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011144215153371026033470 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-f988cd549-68kmh2026-03-08T22:02:03.442597504Z I0308 22:02:03.442574 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T22:02:03.442632495Z I0308 22:02:03.442595 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:02:03.442632495Z I0308 22:02:03.442615 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T22:02:03.442632495Z I0308 22:02:03.442624 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:02:03.442723157Z I0308 22:02:03.442579 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T22:02:03.542858575Z I0308 22:02:03.542434 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:02:03.542858575Z I0308 22:02:03.542503 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:02:03.544221430Z I0308 22:02:03.543701 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:02:03.544221430Z I0308 22:02:03.543737 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T22:02:03.544221430Z I0308 22:02:03.543833 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T22:02:03.544221430Z I0308 22:02:03.543881 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:02:04.051831396Z time="2026-03-08T22:02:04Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-08T22:02:04.097693782Z E0308 22:02:04.097614 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.100717199Z E0308 22:02:04.098186 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.100717199Z E0308 22:02:04.098444 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.100717199Z E0308 22:02:04.098461 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.100717199Z E0308 22:02:04.098664 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.115746148Z E0308 22:02:04.115445 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.116706642Z E0308 22:02:04.115803 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.116706642Z E0308 22:02:04.116596 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.120193573Z E0308 22:02:04.116749 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.120193573Z E0308 22:02:04.116767 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.120193573Z E0308 22:02:04.117785 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.123983251Z E0308 22:02:04.123844 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.124182606Z E0308 22:02:04.124140 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.124226967Z E0308 22:02:04.124195 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.124291999Z E0308 22:02:04.124273 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.124644198Z E0308 22:02:04.124611 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.126609318Z E0308 22:02:04.125338 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.130588061Z E0308 22:02:04.130561 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.130914920Z E0308 22:02:04.130893 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.131223978Z E0308 22:02:04.131183 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.131284669Z E0308 22:02:04.131267 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.132467910Z E0308 22:02:04.132014 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.181812535Z E0308 22:02:04.181743 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.181872377Z E0308 22:02:04.181808 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.181997110Z E0308 22:02:04.181968 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.182317528Z E0308 22:02:04.182282 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.182317528Z E0308 22:02:04.182309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.275489006Z E0308 22:02:04.275309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.275489006Z E0308 22:02:04.275309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.283465401Z E0308 22:02:04.281547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.285418662Z E0308 22:02:04.284292 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.285418662Z E0308 22:02:04.284505 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.456178175Z E0308 22:02:04.455820 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.456178175Z E0308 22:02:04.456127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.456366909Z E0308 22:02:04.456288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.456470602Z E0308 22:02:04.456436 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.456568734Z E0308 22:02:04.456552 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.786050768Z E0308 22:02:04.784377 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.786050768Z E0308 22:02:04.784449 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.786050768Z E0308 22:02:04.784556 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.786279525Z E0308 22:02:04.786250 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:04.786654354Z E0308 22:02:04.786617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:05.429723650Z E0308 22:02:05.429637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:05.429723650Z E0308 22:02:05.429667 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:05.430053289Z E0308 22:02:05.430014 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:05.430227224Z E0308 22:02:05.430151 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:05.430227224Z E0308 22:02:05.429637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:06.247770688Z time="2026-03-08T22:02:06Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-08T22:02:06.597160737Z time="2026-03-08T22:02:06Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-08T22:02:06.717333692Z E0308 22:02:06.717261 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:06.717333692Z E0308 22:02:06.717309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:06.717498346Z E0308 22:02:06.717469 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:06.717595029Z E0308 22:02:06.717542 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:06.717653350Z E0308 22:02:06.717624 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:07.666589441Z time="2026-03-08T22:02:07Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-08T22:02:09.286452877Z E0308 22:02:09.286384 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.286684583Z E0308 22:02:09.286663 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.286863938Z E0308 22:02:09.286793 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.286999521Z E0308 22:02:09.286953 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.287171775Z E0308 22:02:09.287146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:10.451834830Z time="2026-03-08T22:02:10Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-08T22:02:14.414257398Z E0308 22:02:14.414173 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.414602137Z E0308 22:02:14.414566 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.414808762Z E0308 22:02:14.414775 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.414995957Z E0308 22:02:14.414963 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.415217353Z E0308 22:02:14.415181 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.943779461Z E0308 22:02:14.943641 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.943779461Z E0308 22:02:14.943739 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.943851362Z E0308 22:02:14.943756 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.943991526Z E0308 22:02:14.943961 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.944054257Z E0308 22:02:14.943641 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:24.666404088Z E0308 22:02:24.666303 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:24.666404088Z E0308 22:02:24.666363 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:24.666484620Z E0308 22:02:24.666438 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:24.666626814Z E0308 22:02:24.666363 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:24.666636304Z E0308 22:02:24.666627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.964314198Z E0308 22:02:44.964178 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.964739630Z E0308 22:02:44.964671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.964985296Z E0308 22:02:44.964918 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.965469808Z E0308 22:02:44.965235 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.965515329Z E0308 22:02:44.965493 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.139814984Z E0308 22:02:45.139705 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.151892175Z E0308 22:02:45.151796 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.674222309Z E0308 22:02:54.673924 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.674222309Z E0308 22:02:54.673978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.676681273Z E0308 22:02:54.676598 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.676832057Z E0308 22:02:54.676762 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.677399331Z E0308 22:02:54.677330 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000004460215153371026037071 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-x5zxr2026-03-08T21:58:23.423201807Z 2026-03-08T21:58:23Z INFO setup starting manager 2026-03-08T21:58:23.423201807Z 2026-03-08T21:58:23Z INFO controller-runtime.metrics Starting metrics server 2026-03-08T21:58:23.423201807Z 2026-03-08T21:58:23Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-08T21:58:23.423201807Z 2026-03-08T21:58:23Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-08T21:58:23.423201807Z 2026-03-08T21:58:23Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-08T21:58:23.423201807Z I0308 21:58:23.422792 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-08T21:58:23.468131975Z I0308 21:58:23.467347 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-08T21:58:23.468131975Z 2026-03-08T21:58:23Z DEBUG events package-server-manager-854648ff6d-x5zxr_4f84a747-9db8-48d1-9601-10715a7f587e became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"a019f6e2-17cf-47f2-ba44-082c71b2041b","apiVersion":"coordination.k8s.io/v1","resourceVersion":"8375"}, "reason": "LeaderElection"} 2026-03-08T21:58:23.468174976Z 2026-03-08T21:58:23Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-08T21:58:23.468174976Z 2026-03-08T21:58:23Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-08T21:58:23.468174976Z 2026-03-08T21:58:23Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-08T21:58:23.687824125Z 2026-03-08T21:58:23Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-08T21:58:23.687824125Z 2026-03-08T21:58:23Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-08T21:58:23.694667663Z 2026-03-08T21:58:23Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T21:58:23.694667663Z 2026-03-08T21:58:23Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.004660470Z 2026-03-08T21:58:24Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.004660470Z 2026-03-08T21:58:24Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T21:58:24.066264781Z 2026-03-08T21:58:24Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-08T21:58:24.071848536Z 2026-03-08T21:58:24Z INFO controllers.packageserver updating csv spec 2026-03-08T21:58:24.099688299Z 2026-03-08T21:58:24Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-08T21:58:24.099757661Z 2026-03-08T21:58:24Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.099935906Z 2026-03-08T21:58:24Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T21:58:24.099968537Z 2026-03-08T21:58:24Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.100120661Z 2026-03-08T21:58:24Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.100226714Z 2026-03-08T21:58:24Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T21:58:24.150758437Z 2026-03-08T21:58:24Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T21:58:24.150758437Z 2026-03-08T21:58:24Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.150758437Z 2026-03-08T21:58:24Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T21:58:24.150758437Z 2026-03-08T21:58:24Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.150758437Z 2026-03-08T21:58:24Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.150758437Z 2026-03-08T21:58:24Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T21:58:24.188606271Z 2026-03-08T21:58:24Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T21:58:24.188606271Z 2026-03-08T21:58:24Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.199837303Z 2026-03-08T21:58:24Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T21:58:24.199837303Z 2026-03-08T21:58:24Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.199837303Z 2026-03-08T21:58:24Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:24.199837303Z 2026-03-08T21:58:24Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T21:58:24.248132237Z 2026-03-08T21:58:24Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T21:58:24.248132237Z 2026-03-08T21:58:24Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:25.478836694Z 2026-03-08T21:58:25Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T21:58:25.478836694Z 2026-03-08T21:58:25Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:25.478895215Z 2026-03-08T21:58:25Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:25.478924426Z 2026-03-08T21:58:25Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T21:58:25.504149612Z 2026-03-08T21:58:25Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T21:58:25.504229905Z 2026-03-08T21:58:25Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:26.239171415Z 2026-03-08T21:58:26Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T21:58:26.239171415Z 2026-03-08T21:58:26Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:26.239171415Z 2026-03-08T21:58:26Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:26.239171415Z 2026-03-08T21:58:26Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T21:58:26.256108076Z 2026-03-08T21:58:26Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T21:58:26.256108076Z 2026-03-08T21:58:26Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:27.110001898Z 2026-03-08T21:58:27Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T21:58:27.110001898Z 2026-03-08T21:58:27Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:27.110001898Z 2026-03-08T21:58:27Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:58:27.110001898Z 2026-03-08T21:58:27Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T21:58:27.162977775Z 2026-03-08T21:58:27Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T21:58:27.162977775Z 2026-03-08T21:58:27Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T21:59:57.519941231Z E0308 21:59:57.519798 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T22:00:57.527128279Z E0308 22:00:57.526967 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-03-08T22:01:57.361685517Z 2026-03-08T22:01:57Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T22:01:57.361685517Z 2026-03-08T22:01:57Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.361685517Z 2026-03-08T22:01:57Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.361685517Z 2026-03-08T22:01:57Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T22:01:57.391968950Z 2026-03-08T22:01:57Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T22:01:57.391968950Z 2026-03-08T22:01:57Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.430296770Z 2026-03-08T22:01:57Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T22:01:57.430296770Z 2026-03-08T22:01:57Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.430296770Z 2026-03-08T22:01:57Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.430296770Z 2026-03-08T22:01:57Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T22:01:57.450259716Z 2026-03-08T22:01:57Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T22:01:57.450259716Z 2026-03-08T22:01:57Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.545733182Z 2026-03-08T22:01:57Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T22:01:57.545733182Z 2026-03-08T22:01:57Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.545870526Z 2026-03-08T22:01:57Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.546328058Z 2026-03-08T22:01:57Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T22:01:57.562039604Z 2026-03-08T22:01:57Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T22:01:57.562039604Z 2026-03-08T22:01:57Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.869889379Z 2026-03-08T22:01:57Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T22:01:57.869889379Z 2026-03-08T22:01:57Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.873781360Z 2026-03-08T22:01:57Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.873781360Z 2026-03-08T22:01:57Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T22:01:57.911163525Z 2026-03-08T22:01:57Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T22:01:57.911163525Z 2026-03-08T22:01:57Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.994025867Z 2026-03-08T22:01:57Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-08T22:01:57.994025867Z 2026-03-08T22:01:57Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.994145770Z 2026-03-08T22:01:57Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-08T22:01:57.994170860Z 2026-03-08T22:01:57Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-08T22:01:58.006369035Z 2026-03-08T22:01:58Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-08T22:01:58.006369035Z 2026-03-08T22:01:58Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415153371026035567 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-x5zxr2026-03-08T21:58:05.486894996Z W0308 21:58:05.486619 1 deprecated.go:66] 2026-03-08T21:58:05.486894996Z ==== Removed Flag Warning ====================== 2026-03-08T21:58:05.486894996Z 2026-03-08T21:58:05.486894996Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-08T21:58:05.486894996Z 2026-03-08T21:58:05.486894996Z =============================================== 2026-03-08T21:58:05.486894996Z 2026-03-08T21:58:05.488173820Z I0308 21:58:05.487170 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-08T21:58:05.493333464Z I0308 21:58:05.492921 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-08T21:58:05.494033332Z I0308 21:58:05.493373 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-08T21:58:05.494033332Z I0308 21:58:05.493836 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415153371026033422 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-d64cfc9db-xqh7x2026-03-08T22:02:51.059867816Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=N6579 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:51.159798078Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=Sq8zl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:51.259249127Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=ewweX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:51.359989001Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=0LemI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:51.459986755Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=hA7lE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:51.560664866Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=tN79T namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:51.659376487Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=G/MnH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:51.759723400Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=Ywcta namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:51.858526553Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=fnEsE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:51.960428526Z time="2026-03-08T22:02:51Z" level=info msg="install strategy successful" csv=packageserver id=0kG9O namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.060036480Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=yEs3C namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.160336832Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=uJYwz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.260157031Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=ESMIu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.361433247Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=3qOX2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.460368384Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=kkMKC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.559680320Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=9k12g namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.659308395Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=DH12d namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.758874237Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=1NTCt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.861397946Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=VCOnl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:52.960573459Z time="2026-03-08T22:02:52Z" level=info msg="install strategy successful" csv=packageserver id=OviOw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.061184189Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=dEl9J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.159120750Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=nsfxE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.260263833Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=tHhug namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.359502307Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=sMjCc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.460148448Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=8Pqne namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.566307971Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=N5e/g namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.659284984Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=eDr3N namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.760210761Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=tsG7d namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.861245053Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=Z+s9w namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:53.959608634Z time="2026-03-08T22:02:53Z" level=info msg="install strategy successful" csv=packageserver id=hovP0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.059526796Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=Ex6NW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.160512865Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=3k0DG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.263761823Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=EDAfl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.359424355Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=+ZZUq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.459148692Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=1ixwR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.561774394Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=aHo5r namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.660045353Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=wro01 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.759033881Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=zZTsz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.859394904Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=jQl84 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:54.960696882Z time="2026-03-08T22:02:54Z" level=info msg="install strategy successful" csv=packageserver id=GXqAR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.060140211Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=v5Z1L namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.160187996Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=27EEE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.260388116Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=MViyR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.358425469Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=R5hcu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.460527137Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=Berd9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.559356161Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=TrzuS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.663220685Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=c7ZAt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.760919449Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=/Xesp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.859232800Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=0XXZZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:55.960169078Z time="2026-03-08T22:02:55Z" level=info msg="install strategy successful" csv=packageserver id=RN+Ep namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.062773999Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=jM7yD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.159300493Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=7a1dU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.259260486Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=G+F4k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.360818900Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=C6z0h namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.460807094Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=x9EGM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.559865404Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=djCVz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.675522533Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=pCiDl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.758990489Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=4FoPe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.859323682Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=KHbVC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:56.960057015Z time="2026-03-08T22:02:56Z" level=info msg="install strategy successful" csv=packageserver id=K3DXG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.058881958Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=ZI6ww namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.158485542Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=r+wnv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.258969738Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=4rwOv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.359498376Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=WLt+D namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.459627083Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=PLRD8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.560180171Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=9sH2Y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.659967430Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=8Ki6D namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.758365302Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=ficDW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.860721107Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=nxsyX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:57.959480449Z time="2026-03-08T22:02:57Z" level=info msg="install strategy successful" csv=packageserver id=jcUrV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.060019236Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=X1+FI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.160018111Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=maPz5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.258903676Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=SvyLw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.359552216Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=+Ad17 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.459966571Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=auEDJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.560503730Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=N17YY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.661907909Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=fne0i namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.759997174Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=D9k+u namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.859751212Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=A68dv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:58.960258629Z time="2026-03-08T22:02:58Z" level=info msg="install strategy successful" csv=packageserver id=s142q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.060005777Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=7xH85 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.159912238Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=7Rkw7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.259520642Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=lqywL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.360909312Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=UY0YY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.461045079Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=CLbFJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.560225692Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=TO4gT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.659873547Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=WyIJz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.759861930Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=+GXlY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.859597678Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=XO5Y/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:02:59.959481278Z time="2026-03-08T22:02:59Z" level=info msg="install strategy successful" csv=packageserver id=7sBzH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.058898267Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=WiYts namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.160520893Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=VamnA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.326019639Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=3FfcJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.359657248Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=qMqgh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.459027806Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=dab43 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.560784155Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=AFMiD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.660366889Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=Ng8T4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.760024364Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=4XHfh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.859338890Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=9oNdp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-08T22:03:00.959370974Z time="2026-03-08T22:03:00Z" level=info msg="install strategy successful" csv=packageserver id=9N6QH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005614015153371026034621 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-7d9c49f57b-6q5t22026-03-08T22:02:04.038703057Z time="2026-03-08T22:02:04Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2mHM/ 2026-03-08T22:02:04.050156473Z time="2026-03-08T22:02:04Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:04.050201404Z time="2026-03-08T22:02:04Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:04.375824668Z time="2026-03-08T22:02:04Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-marketplace state.State=READY" 2026-03-08T22:02:04.375824668Z time="2026-03-08T22:02:04Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:04.375824668Z time="2026-03-08T22:02:04Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:04.375824668Z time="2026-03-08T22:02:04Z" level=info msg="resolving sources" id=QzrKA namespace=openshift-marketplace 2026-03-08T22:02:04.375824668Z time="2026-03-08T22:02:04Z" level=info msg="checking if subscriptions need update" id=QzrKA namespace=openshift-marketplace 2026-03-08T22:02:04.381187606Z time="2026-03-08T22:02:04Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=QzrKA namespace=openshift-marketplace 2026-03-08T22:02:04.441162486Z time="2026-03-08T22:02:04Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:04.441162486Z time="2026-03-08T22:02:04Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:04.441162486Z time="2026-03-08T22:02:04Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:04.441162486Z time="2026-03-08T22:02:04Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=ZWgyF 2026-03-08T22:02:04.441162486Z time="2026-03-08T22:02:04Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:04.441162486Z time="2026-03-08T22:02:04Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:05.038137942Z time="2026-03-08T22:02:05Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:05.038137942Z time="2026-03-08T22:02:05Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mg95b current-pod.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:05.038137942Z time="2026-03-08T22:02:05Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mg95b current-pod.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:05.038137942Z time="2026-03-08T22:02:05Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=5MDI8 2026-03-08T22:02:05.038137942Z time="2026-03-08T22:02:05Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:05.038137942Z time="2026-03-08T22:02:05Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:05.587217400Z time="2026-03-08T22:02:05Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=certified-operators state.State=READY" 2026-03-08T22:02:05.587217400Z time="2026-03-08T22:02:05Z" level=info msg="resolving sources" id=uoW0I namespace=openshift-marketplace 2026-03-08T22:02:05.587217400Z time="2026-03-08T22:02:05Z" level=info msg="checking if subscriptions need update" id=uoW0I namespace=openshift-marketplace 2026-03-08T22:02:05.590384862Z time="2026-03-08T22:02:05Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=uoW0I namespace=openshift-marketplace 2026-03-08T22:02:05.639968983Z time="2026-03-08T22:02:05Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:05.640057885Z time="2026-03-08T22:02:05Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:05.640057885Z time="2026-03-08T22:02:05Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:05.640599970Z time="2026-03-08T22:02:05Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:05.640599970Z time="2026-03-08T22:02:05Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZWgyF 2026-03-08T22:02:05.650434554Z time="2026-03-08T22:02:05Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:05.650609268Z time="2026-03-08T22:02:05Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:06.240145152Z time="2026-03-08T22:02:06Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:06.240368537Z time="2026-03-08T22:02:06Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mg95b current-pod.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:06.240402638Z time="2026-03-08T22:02:06Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mg95b current-pod.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:06.240509751Z time="2026-03-08T22:02:06Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:06.240537571Z time="2026-03-08T22:02:06Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=5MDI8 2026-03-08T22:02:06.249617897Z time="2026-03-08T22:02:06Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:06.249694059Z time="2026-03-08T22:02:06Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:06.437554393Z time="2026-03-08T22:02:06Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:06.437757098Z time="2026-03-08T22:02:06Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8ctpt current-pod.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:06.437788898Z time="2026-03-08T22:02:06Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8ctpt current-pod.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:06.437823579Z time="2026-03-08T22:02:06Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=uEt1e 2026-03-08T22:02:06.437845880Z time="2026-03-08T22:02:06Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:06.437869040Z time="2026-03-08T22:02:06Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:07.040170594Z time="2026-03-08T22:02:07Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:07.040170594Z time="2026-03-08T22:02:07Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:07.040170594Z time="2026-03-08T22:02:07Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:07.040170594Z time="2026-03-08T22:02:07Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=QqwFm 2026-03-08T22:02:07.040170594Z time="2026-03-08T22:02:07Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:07.040170594Z time="2026-03-08T22:02:07Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:07.639587132Z time="2026-03-08T22:02:07Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:07.639701636Z time="2026-03-08T22:02:07Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8ctpt current-pod.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:07.639701636Z time="2026-03-08T22:02:07Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8ctpt current-pod.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:07.639812689Z time="2026-03-08T22:02:07Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:07.639812689Z time="2026-03-08T22:02:07Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=uEt1e 2026-03-08T22:02:07.656910940Z time="2026-03-08T22:02:07Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:07.657009093Z time="2026-03-08T22:02:07Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:08.238337934Z time="2026-03-08T22:02:08Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:08.238455627Z time="2026-03-08T22:02:08Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:08.238470537Z time="2026-03-08T22:02:08Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:08.238614831Z time="2026-03-08T22:02:08Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:08.238614831Z time="2026-03-08T22:02:08Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QqwFm 2026-03-08T22:02:08.254967734Z time="2026-03-08T22:02:08Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:08.254967734Z time="2026-03-08T22:02:08Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:08.441267658Z time="2026-03-08T22:02:08Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:08.441267658Z time="2026-03-08T22:02:08Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mg95b current-pod.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:08.441267658Z time="2026-03-08T22:02:08Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mg95b current-pod.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:08.441267658Z time="2026-03-08T22:02:08Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=ukggP 2026-03-08T22:02:08.441267658Z time="2026-03-08T22:02:08Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:08.441267658Z time="2026-03-08T22:02:08Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:09.042107913Z time="2026-03-08T22:02:09Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:09.042107913Z time="2026-03-08T22:02:09Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8ctpt current-pod.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:09.042107913Z time="2026-03-08T22:02:09Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8ctpt current-pod.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:09.042107913Z time="2026-03-08T22:02:09Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=RMkp2 2026-03-08T22:02:09.042107913Z time="2026-03-08T22:02:09Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:09.042107913Z time="2026-03-08T22:02:09Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:09.644336984Z time="2026-03-08T22:02:09Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:09.644607081Z time="2026-03-08T22:02:09Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mg95b current-pod.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:09.644646543Z time="2026-03-08T22:02:09Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-mg95b current-pod.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:09.644788187Z time="2026-03-08T22:02:09Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:09.644820718Z time="2026-03-08T22:02:09Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ukggP 2026-03-08T22:02:09.644917660Z time="2026-03-08T22:02:09Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:09.644956711Z time="2026-03-08T22:02:09Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:10.242142572Z time="2026-03-08T22:02:10Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:10.242454020Z time="2026-03-08T22:02:10Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8ctpt current-pod.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:10.242487691Z time="2026-03-08T22:02:10Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8ctpt current-pod.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:10.242594314Z time="2026-03-08T22:02:10Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:10.242651145Z time="2026-03-08T22:02:10Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=RMkp2 2026-03-08T22:02:10.438463024Z time="2026-03-08T22:02:10Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:10.438675111Z time="2026-03-08T22:02:10Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:10.438709242Z time="2026-03-08T22:02:10Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:10.438741252Z time="2026-03-08T22:02:10Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=2xQoT 2026-03-08T22:02:10.438773243Z time="2026-03-08T22:02:10Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:10.438797004Z time="2026-03-08T22:02:10Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:11.039751422Z time="2026-03-08T22:02:11Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:11.039878895Z time="2026-03-08T22:02:11Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:11.039878895Z time="2026-03-08T22:02:11Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-8w7wm current-pod.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:11.039974578Z time="2026-03-08T22:02:11Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2xQoT 2026-03-08T22:02:11.039974578Z time="2026-03-08T22:02:11Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=2xQoT config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_current.log0000640000000000000000000001055315153371026031055 0ustar00000000000000002026-03-08T22:00:42.509179931Z I0308 22:00:42.506307 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-08T22:00:42.509179931Z I0308 22:00:42.506623 1 observer_polling.go:159] Starting file observer 2026-03-08T22:00:42.509179931Z I0308 22:00:42.507447 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-08T22:00:42.509179931Z I0308 22:00:42.507506 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T22:00:42.509179931Z I0308 22:00:42.508135 1 observer_polling.go:159] Starting file observer 2026-03-08T22:01:39.299293192Z I0308 22:01:39.299176 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602170912.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-08T22:01:40.093358352Z I0308 22:01:40.093301 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T22:01:40.093358352Z W0308 22:01:40.093328 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:40.093766162Z W0308 22:01:40.093332 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:40.093766162Z W0308 22:01:40.093759 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T22:01:40.093777952Z W0308 22:01:40.093771 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T22:01:40.093777952Z W0308 22:01:40.093775 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T22:01:40.093785982Z W0308 22:01:40.093777 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T22:01:40.099243723Z I0308 22:01:40.099188 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T22:01:40.099264094Z I0308 22:01:40.099255 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T22:01:40.099398587Z I0308 22:01:40.099337 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T22:01:40.099441068Z I0308 22:01:40.099422 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:01:40.099658524Z I0308 22:01:40.099599 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T22:01:40.099726546Z I0308 22:01:40.099705 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-08T22:01:40.099835188Z I0308 22:01:40.099790 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T22:01:40.099904550Z I0308 22:01:40.099879 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T22:01:40.099930331Z I0308 22:01:40.099921 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:40.100331372Z I0308 22:01:40.100299 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-08T22:01:40.100674230Z I0308 22:01:40.100628 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-08T22:01:40.201036994Z I0308 22:01:40.200911 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:40.201036994Z I0308 22:01:40.200937 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:01:40.201295080Z I0308 22:01:40.201255 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bh88w/etcd-operator_previous.log0000640000000000000000000004121415153371026031245 0ustar00000000000000002026-03-08T21:58:51.501483011Z I0308 21:58:51.501472 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-08T21:58:51.501518132Z I0308 21:58:51.501509 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-08T21:58:51.501544823Z I0308 21:58:51.501535 1 controller_manager.go:54] PruneController controller terminated 2026-03-08T21:58:51.501589274Z I0308 21:58:51.501580 1 base_controller.go:181] Shutting down EtcdStaticResources-StaticResources ... 2026-03-08T21:58:51.501664065Z I0308 21:58:51.501637 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-08T21:58:51.501706537Z I0308 21:58:51.501687 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-08T21:58:51.501718687Z I0308 21:58:51.501712 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-03-08T21:58:51.501742437Z I0308 21:58:51.501724 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-03-08T21:58:51.501842410Z I0308 21:58:51.501821 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-08T21:58:51.501874731Z I0308 21:58:51.501842 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-08T21:58:51.501904931Z I0308 21:58:51.501886 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-08T21:58:51.502085787Z I0308 21:58:51.502045 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T21:58:51.502100017Z I0308 21:58:51.502091 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-08T21:58:51.502127038Z I0308 21:58:51.502108 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T21:58:51.502180099Z I0308 21:58:51.502160 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-03-08T21:58:51.502342153Z I0308 21:58:51.502320 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-08T21:58:51.502342153Z I0308 21:58:51.502336 1 builder.go:335] server exited 2026-03-08T21:58:51.502526238Z E0308 21:58:51.502490 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:51.502589519Z I0308 21:58:51.502568 1 base_controller.go:181] Shutting down ScriptController ... 2026-03-08T21:58:51.502633160Z E0308 21:58:51.502597 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:51.502676051Z I0308 21:58:51.502654 1 base_controller.go:181] Shutting down etcd-UnsupportedConfigOverrides ... 2026-03-08T21:58:51.502706092Z I0308 21:58:51.502686 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-08T21:58:51.502834305Z I0308 21:58:51.502810 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1874949951/tls.crt::/tmp/serving-cert-1874949951/tls.key" 2026-03-08T21:58:51.502948878Z I0308 21:58:51.502921 1 base_controller.go:123] Shutting down worker of etcd-UnsupportedConfigOverrides controller ... 2026-03-08T21:58:51.502959908Z I0308 21:58:51.502952 1 base_controller.go:113] All etcd-UnsupportedConfigOverrides workers have been terminated 2026-03-08T21:58:51.503000049Z I0308 21:58:51.502977 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-08T21:58:51.503038630Z I0308 21:58:51.503018 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-08T21:58:51.503047031Z I0308 21:58:51.503036 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-08T21:58:51.503139953Z I0308 21:58:51.503116 1 base_controller.go:181] Shutting down ClusterMemberController ... 2026-03-08T21:58:51.503153533Z I0308 21:58:51.503141 1 base_controller.go:181] Shutting down StatusSyncer_etcd ... 2026-03-08T21:58:51.503164893Z I0308 21:58:51.503155 1 base_controller.go:181] Shutting down EtcdEndpointsController ... 2026-03-08T21:58:51.503189734Z I0308 21:58:51.503169 1 base_controller.go:123] Shutting down worker of StatusSyncer_etcd controller ... 2026-03-08T21:58:51.503242505Z I0308 21:58:51.503205 1 base_controller.go:159] All StatusSyncer_etcd post start hooks have been terminated 2026-03-08T21:58:51.503242505Z I0308 21:58:51.503221 1 base_controller.go:181] Shutting down BootstrapTeardownController ... 2026-03-08T21:58:51.503251656Z I0308 21:58:51.503240 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-08T21:58:51.503260706Z I0308 21:58:51.503255 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-08T21:58:51.503308837Z I0308 21:58:51.503286 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-08T21:58:51.503308837Z I0308 21:58:51.503297 1 base_controller.go:181] Shutting down GuardController ... 2026-03-08T21:58:51.503319187Z I0308 21:58:51.503312 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-08T21:58:51.503326677Z I0308 21:58:51.503302 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-08T21:58:51.503365048Z I0308 21:58:51.503324 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-08T21:58:51.503365048Z I0308 21:58:51.503353 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-03-08T21:58:51.503374419Z I0308 21:58:51.503363 1 base_controller.go:123] Shutting down worker of etcd-operator-UnsupportedConfigOverrides controller ... 2026-03-08T21:58:51.503374419Z I0308 21:58:51.503367 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-03-08T21:58:51.503410910Z I0308 21:58:51.503386 1 envvarcontroller.go:252] Shutting down EnvVarController 2026-03-08T21:58:51.503410910Z I0308 21:58:51.503341 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-08T21:58:51.503449491Z E0308 21:58:51.503418 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts\": context canceled" 2026-03-08T21:58:51.503457752Z I0308 21:58:51.503447 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-08T21:58:51.503465312Z I0308 21:58:51.503426 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-08T21:58:51.503465312Z I0308 21:58:51.503459 1 controller_manager.go:54] RevisionController controller terminated 2026-03-08T21:58:51.503478862Z I0308 21:58:51.503468 1 controller_manager.go:54] GuardController controller terminated 2026-03-08T21:58:51.503478862Z I0308 21:58:51.503327 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-08T21:58:51.503488602Z I0308 21:58:51.503483 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-08T21:58:51.503521893Z I0308 21:58:51.503355 1 base_controller.go:181] Shutting down etcd-operator-UnsupportedConfigOverrides ... 2026-03-08T21:58:51.503521893Z I0308 21:58:51.503491 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"846cc420-c258-4d1a-b7c5-5397a6ccb1d9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-03-08T21:58:51.503521893Z I0308 21:58:51.503513 1 base_controller.go:113] All etcd-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-08T21:58:51.503546474Z I0308 21:58:51.503523 1 controller_manager.go:54] etcd-operator-UnsupportedConfigOverrides controller terminated 2026-03-08T21:58:51.503546474Z I0308 21:58:51.503539 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-08T21:58:51.503576255Z I0308 21:58:51.503554 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-08T21:58:51.503611005Z I0308 21:58:51.503589 1 base_controller.go:123] Shutting down worker of FSyncController controller ... 2026-03-08T21:58:51.503611005Z I0308 21:58:51.503606 1 base_controller.go:113] All FSyncController workers have been terminated 2026-03-08T21:58:51.503640986Z I0308 21:58:51.503620 1 base_controller.go:123] Shutting down worker of EtcdCertCleanerController controller ... 2026-03-08T21:58:51.503640986Z I0308 21:58:51.503636 1 base_controller.go:113] All EtcdCertCleanerController workers have been terminated 2026-03-08T21:58:51.503686127Z I0308 21:58:51.503659 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-03-08T21:58:51.503696218Z I0308 21:58:51.503689 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-08T21:58:51.503705218Z I0308 21:58:51.503698 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-08T21:58:51.503901213Z E0308 21:58:51.499444 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-08T21:58:51.503993015Z E0308 21:58:51.503969 1 leaderelection.go:436] error retrieving resource lock openshift-etcd-operator/openshift-cluster-etcd-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-08T21:58:51.503993015Z I0308 21:58:51.503987 1 leaderelection.go:297] failed to renew lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock: timed out waiting for the condition 2026-03-08T21:58:51.504423595Z E0308 21:58:51.504338 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/backups-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/etcd-backup-sa\": context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:58:51.504481877Z I0308 21:58:51.504468 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-08T21:58:51.504513708Z I0308 21:58:51.504504 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-08T21:58:51.506120548Z I0308 21:58:51.506083 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-08T21:58:51.506120548Z I0308 21:58:51.506114 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-08T21:58:51.506542579Z E0308 21:58:51.506497 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:58:51.507806082Z I0308 21:58:51.507764 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-08T21:58:51.507806082Z I0308 21:58:51.507788 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-08T21:58:51.507806082Z I0308 21:58:51.507796 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-08T21:58:51.846233123Z I0308 21:58:51.846052 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T21:58:52.042287344Z I0308 21:58:52.042177 1 observer_polling.go:162] Shutting down file observer 2026-03-08T21:59:03.019522688Z W0308 21:59:03.019387 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T21:59:03.021698013Z E0308 21:59:03.021613 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-03-08T21:59:03.023004396Z I0308 21:59:03.022918 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-03-08T21:59:03.023004396Z I0308 21:59:03.022992 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-03-08T21:59:03.430661200Z W0308 21:59:03.430561 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T21:59:04.197792750Z W0308 21:59:04.197659 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T21:59:06.198447749Z I0308 21:59:06.198350 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T21:59:06.848615399Z W0308 21:59:06.848451 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T21:59:06.851127373Z E0308 21:59:06.851042 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberController reconciliation failed: could not get list of unhealthy members: giving up getting a cached client after 3 tries" 2026-03-08T21:59:06.852462497Z I0308 21:59:06.852380 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-03-08T21:59:06.852462497Z I0308 21:59:06.852455 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-03-08T21:59:07.431623320Z I0308 21:59:07.431433 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T21:59:21.203543052Z W0308 21:59:21.203481 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T21:59:22.433909692Z W0308 21:59:22.433835 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-08T21:59:22.434381605Z E0308 21:59:22.434357 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: giving up getting a cached client after 3 tries" 2026-03-08T21:59:22.435695108Z I0308 21:59:22.435633 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-03-08T21:59:22.435714098Z I0308 21:59:22.435700 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-03-08T21:59:25.204346508Z I0308 21:59:25.204224 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T21:59:25.512607957Z E0308 21:59:25.512462 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T21:59:25.512607957Z W0308 21:59:25.512529 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bh88w.json0000640000000000000000000001575615153371026024001 0ustar0000000000000000{"metadata":{"name":"etcd-operator-5884b9cd56-bh88w","generateName":"etcd-operator-5884b9cd56-","namespace":"openshift-etcd-operator","uid":"4382d186-34e4-40af-9b92-bb17ddcaa23f","resourceVersion":"9480","creationTimestamp":"2026-03-08T21:56:07Z","labels":{"app":"etcd-operator","pod-template-hash":"5884b9cd56"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-5884b9cd56","uid":"b3174208-becb-4424-96d6-ac05cf274866","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-2hstt","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-2hstt","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-03-08T21:57:18Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-08T22:00:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T21:57:31Z","finishedAt":"2026-03-08T21:59:25Z","containerID":"cri-o://939aa1886a91ab1eb51e8a1cf13c57622098c7bede001e5d513bea76546b85fa"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","containerID":"cri-o://41b89fabe8bcfa93d37c680741df23c997dd23bfef1e93509706508b89ba3e17","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-2hstt","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000003311715153371026033762 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-6f9445b8fd-w44n62026-03-08T21:58:06.386866037Z W0308 21:58:06.386629 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-08T21:58:06.387485363Z I0308 21:58:06.387051 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773007086 cert, and key in /tmp/serving-cert-600549221/serving-signer.crt, /tmp/serving-cert-600549221/serving-signer.key 2026-03-08T21:58:06.949946222Z I0308 21:58:06.948109 1 observer_polling.go:159] Starting file observer 2026-03-08T21:58:06.969980682Z I0308 21:58:06.969843 1 builder.go:304] check-endpoints version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-08T21:58:06.971092771Z I0308 21:58:06.971027 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-600549221/tls.crt::/tmp/serving-cert-600549221/tls.key" 2026-03-08T21:58:07.507553554Z I0308 21:58:07.507491 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-08T21:58:07.509044222Z I0308 21:58:07.509021 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-08T21:58:07.509044222Z I0308 21:58:07.509038 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-08T21:58:07.509065993Z I0308 21:58:07.509059 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-08T21:58:07.509088554Z I0308 21:58:07.509065 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-08T21:58:07.513268872Z I0308 21:58:07.513236 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T21:58:07.513268872Z W0308 21:58:07.513264 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T21:58:07.513283773Z W0308 21:58:07.513270 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T21:58:07.513283773Z W0308 21:58:07.513278 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T21:58:07.513292213Z W0308 21:58:07.513282 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T21:58:07.513292213Z W0308 21:58:07.513287 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T21:58:07.513300233Z W0308 21:58:07.513290 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T21:58:07.513398596Z I0308 21:58:07.513339 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-08T21:58:07.515990263Z I0308 21:58:07.515965 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T21:58:07.516031094Z I0308 21:58:07.516013 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T21:58:07.516098236Z I0308 21:58:07.516061 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T21:58:07.516135827Z I0308 21:58:07.516122 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T21:58:07.516189628Z I0308 21:58:07.516060 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T21:58:07.516241979Z I0308 21:58:07.516218 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T21:58:07.516262700Z I0308 21:58:07.516162 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T21:58:07.516358412Z I0308 21:58:07.516313 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-600549221/tls.crt::/tmp/serving-cert-600549221/tls.key" 2026-03-08T21:58:07.516465825Z I0308 21:58:07.516314 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-600549221/tls.crt::/tmp/serving-cert-600549221/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773007086\" (2026-03-08 21:58:05 +0000 UTC to 2026-04-07 21:58:06 +0000 UTC (now=2026-03-08 21:58:07.51628272 +0000 UTC))" 2026-03-08T21:58:07.516717732Z I0308 21:58:07.516691 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T21:58:07.516776154Z I0308 21:58:07.516737 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773007087\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773007087\" (2026-03-08 20:58:06 +0000 UTC to 2027-03-08 20:58:06 +0000 UTC (now=2026-03-08 21:58:07.516710582 +0000 UTC))" 2026-03-08T21:58:07.516855756Z I0308 21:58:07.516837 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T21:58:07.517593555Z I0308 21:58:07.517570 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-08T21:58:07.517632416Z I0308 21:58:07.517615 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-08T21:58:07.518769105Z I0308 21:58:07.518752 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-08T21:58:07.519802032Z I0308 21:58:07.519783 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:58:07.520303175Z I0308 21:58:07.520271 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:58:07.520515020Z I0308 21:58:07.520386 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:58:07.616548397Z I0308 21:58:07.616485 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T21:58:07.616651849Z I0308 21:58:07.616597 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T21:58:07.616651849Z I0308 21:58:07.616531 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T21:58:07.616979378Z I0308 21:58:07.616933 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 21:40:59 +0000 UTC to 2036-03-05 21:40:59 +0000 UTC (now=2026-03-08 21:58:07.616897606 +0000 UTC))" 2026-03-08T21:58:07.616979378Z I0308 21:58:07.616966 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-08 21:47:40 +0000 UTC to 2026-03-09 21:47:40 +0000 UTC (now=2026-03-08 21:58:07.616956557 +0000 UTC))" 2026-03-08T21:58:07.617003708Z I0308 21:58:07.616978 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-08 21:47:40 +0000 UTC to 2027-03-08 21:47:40 +0000 UTC (now=2026-03-08 21:58:07.616970467 +0000 UTC))" 2026-03-08T21:58:07.617003708Z I0308 21:58:07.616990 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-08 21:47:41 +0000 UTC to 2027-03-08 21:47:41 +0000 UTC (now=2026-03-08 21:58:07.616982498 +0000 UTC))" 2026-03-08T21:58:07.617012038Z I0308 21:58:07.617002 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 21:47:38 +0000 UTC to 2036-03-05 21:47:38 +0000 UTC (now=2026-03-08 21:58:07.616995338 +0000 UTC))" 2026-03-08T21:58:07.617204453Z I0308 21:58:07.617171 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-600549221/tls.crt::/tmp/serving-cert-600549221/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773007086\" (2026-03-08 21:58:05 +0000 UTC to 2026-04-07 21:58:06 +0000 UTC (now=2026-03-08 21:58:07.617157862 +0000 UTC))" 2026-03-08T21:58:07.617299656Z I0308 21:58:07.617281 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773007087\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773007087\" (2026-03-08 20:58:06 +0000 UTC to 2027-03-08 20:58:06 +0000 UTC (now=2026-03-08 21:58:07.617269155 +0000 UTC))" 2026-03-08T21:58:07.617401859Z I0308 21:58:07.617381 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 21:40:59 +0000 UTC to 2036-03-05 21:40:59 +0000 UTC (now=2026-03-08 21:58:07.617371829 +0000 UTC))" 2026-03-08T21:58:07.617401859Z I0308 21:58:07.617397 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-08 21:47:40 +0000 UTC to 2026-03-09 21:47:40 +0000 UTC (now=2026-03-08 21:58:07.617389709 +0000 UTC))" 2026-03-08T21:58:07.617470551Z I0308 21:58:07.617423 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-08 21:47:40 +0000 UTC to 2027-03-08 21:47:40 +0000 UTC (now=2026-03-08 21:58:07.617402219 +0000 UTC))" 2026-03-08T21:58:07.617470551Z I0308 21:58:07.617438 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-08 21:47:41 +0000 UTC to 2027-03-08 21:47:41 +0000 UTC (now=2026-03-08 21:58:07.61743058 +0000 UTC))" 2026-03-08T21:58:07.617470551Z I0308 21:58:07.617450 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 21:47:38 +0000 UTC to 2036-03-05 21:47:38 +0000 UTC (now=2026-03-08 21:58:07.61744305 +0000 UTC))" 2026-03-08T21:58:07.617470551Z I0308 21:58:07.617462 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-08 21:47:38 +0000 UTC to 2026-03-09 21:47:38 +0000 UTC (now=2026-03-08 21:58:07.617454791 +0000 UTC))" 2026-03-08T21:58:07.617713687Z I0308 21:58:07.617554 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-600549221/tls.crt::/tmp/serving-cert-600549221/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773007086\" (2026-03-08 21:58:05 +0000 UTC to 2026-04-07 21:58:06 +0000 UTC (now=2026-03-08 21:58:07.617545283 +0000 UTC))" 2026-03-08T21:58:07.617713687Z I0308 21:58:07.617645 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773007087\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773007087\" (2026-03-08 20:58:06 +0000 UTC to 2027-03-08 20:58:06 +0000 UTC (now=2026-03-08 21:58:07.617636085 +0000 UTC))" 2026-03-08T21:58:07.888188507Z I0308 21:58:07.888112 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:58:07.919805339Z I0308 21:58:07.919741 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-08T21:58:07.919805339Z I0308 21:58:07.919780 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-6f9445b8fd-w44n6/openshift-apiserver_current.log0000640000000000000000000011723015153371026030764 0ustar00000000000000002026-03-08T22:02:44.957563804Z E0308 22:02:44.955699 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.957893863Z E0308 22:02:44.955699 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.958214271Z E0308 22:02:44.955736 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.958499488Z E0308 22:02:44.955792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.958854677Z E0308 22:02:44.955817 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.959218287Z E0308 22:02:44.955816 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.959591887Z E0308 22:02:44.955828 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.959915865Z E0308 22:02:44.955869 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.960316675Z E0308 22:02:44.955896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.960603193Z E0308 22:02:44.955927 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.960732416Z E0308 22:02:44.955929 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.960993133Z E0308 22:02:44.955939 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.967376807Z E0308 22:02:44.967319 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.967574303Z E0308 22:02:44.967524 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.967723537Z E0308 22:02:44.967681 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.967837200Z E0308 22:02:44.967809 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.967950883Z E0308 22:02:44.967912 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.967997884Z E0308 22:02:44.967959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968028595Z E0308 22:02:44.968011 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968236530Z E0308 22:02:44.968194 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968361483Z E0308 22:02:44.968324 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968427765Z E0308 22:02:44.968394 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968520497Z E0308 22:02:44.967678 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968689211Z E0308 22:02:44.968575 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968689211Z E0308 22:02:44.968203 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968689211Z E0308 22:02:44.967813 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968845816Z E0308 22:02:44.968790 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.982304283Z E0308 22:02:44.980672 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.982304283Z E0308 22:02:44.981180 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.982304283Z E0308 22:02:44.981408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.982304283Z E0308 22:02:44.981644 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.982304283Z E0308 22:02:44.981891 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.983287539Z E0308 22:02:44.983234 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.983729300Z E0308 22:02:44.983683 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.983964316Z E0308 22:02:44.983920 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.984228374Z E0308 22:02:44.984187 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.984461650Z E0308 22:02:44.984421 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.051570124Z E0308 22:02:45.051496 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.065606756Z E0308 22:02:45.065558 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.065715209Z E0308 22:02:45.065624 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.076260201Z E0308 22:02:45.075369 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.076260201Z E0308 22:02:45.075411 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.084640628Z E0308 22:02:45.084592 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.091973837Z E0308 22:02:45.091548 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.100330893Z E0308 22:02:45.100287 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.101384750Z E0308 22:02:45.100525 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.108587696Z E0308 22:02:45.108553 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.108716820Z E0308 22:02:45.108676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.117936148Z E0308 22:02:45.117911 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.118171514Z E0308 22:02:45.118060 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.127936896Z E0308 22:02:45.127883 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.127970207Z E0308 22:02:45.127929 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.139362252Z E0308 22:02:45.139296 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.150039568Z E0308 22:02:45.149752 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.157569022Z E0308 22:02:45.157509 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:52.185423270Z E0308 22:02:52.185309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:52.185493192Z E0308 22:02:52.185317 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:52.185539173Z E0308 22:02:52.185469 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:52.185676966Z E0308 22:02:52.185470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:52.185876841Z E0308 22:02:52.185473 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.528137845Z E0308 22:02:53.528005 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.528539365Z E0308 22:02:53.528500 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.528687819Z E0308 22:02:53.528641 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.528881624Z E0308 22:02:53.528832 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.528955536Z E0308 22:02:53.528525 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.558826508Z E0308 22:02:53.558778 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.558966862Z E0308 22:02:53.558931 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.559021803Z E0308 22:02:53.558991 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.559113746Z E0308 22:02:53.559094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.571550747Z E0308 22:02:53.571506 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.602746673Z E0308 22:02:53.602673 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.602855536Z E0308 22:02:53.602826 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.603045060Z E0308 22:02:53.602996 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.603137053Z E0308 22:02:53.603107 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.603259776Z E0308 22:02:53.602682 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.898604197Z E0308 22:02:53.898493 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.898709330Z E0308 22:02:53.898587 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.898709330Z E0308 22:02:53.898493 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.898709330Z E0308 22:02:53.898656 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:53.898804762Z E0308 22:02:53.898729 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.775131216Z E0308 22:02:54.774976 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.775203888Z E0308 22:02:54.775121 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.775203888Z E0308 22:02:54.775142 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.775549678Z E0308 22:02:54.775461 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.775642850Z E0308 22:02:54.775608 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.916664433Z E0308 22:02:54.913750 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.916664433Z E0308 22:02:54.913927 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.916664433Z E0308 22:02:54.914479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.916664433Z E0308 22:02:54.914744 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:54.916664433Z E0308 22:02:54.914867 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:55.760729744Z E0308 22:02:55.760649 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:55.761303930Z E0308 22:02:55.761264 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:55.765123138Z E0308 22:02:55.761605 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:55.765123138Z E0308 22:02:55.762179 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:55.765123138Z E0308 22:02:55.762725 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:56.360340397Z E0308 22:02:56.360252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:56.360410890Z E0308 22:02:56.360329 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:56.360410890Z E0308 22:02:56.360337 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:56.360480602Z E0308 22:02:56.360252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:56.360551884Z E0308 22:02:56.360521 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315153371026040372 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-nqz5k2026-03-08T22:00:42.344037334Z I0308 22:00:42.343858 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-08T22:00:42.344037334Z I0308 22:00:42.343995 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T22:00:42.345650675Z I0308 22:00:42.345268 1 observer_polling.go:159] Starting file observer 2026-03-08T22:01:39.364275042Z I0308 22:01:39.360179 1 builder.go:304] openshift-apiserver-operator version - 2026-03-08T22:01:39.859798816Z I0308 22:01:39.854412 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T22:01:39.859798816Z W0308 22:01:39.854468 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:39.859798816Z W0308 22:01:39.854473 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:39.859798816Z W0308 22:01:39.854478 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T22:01:39.859798816Z W0308 22:01:39.854481 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T22:01:39.859798816Z W0308 22:01:39.854500 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T22:01:39.859798816Z W0308 22:01:39.854504 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T22:01:39.860989877Z I0308 22:01:39.860958 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861456 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861513 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861530 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861589 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861597 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861623 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861629 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861700 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861505 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T22:01:39.863258045Z I0308 22:01:39.861982 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... 2026-03-08T22:01:39.962813638Z I0308 22:01:39.962169 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T22:01:39.962813638Z I0308 22:01:39.962238 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:39.962813638Z I0308 22:01:39.962300 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file openshift-apiserver-operator_previous.log0000640000000000000000000004276715153371026040611 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-nqz5k2026-03-08T21:58:24.543781732Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401 2026-03-08T21:58:24.543781732Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401 2026-03-08T21:58:24.543781732Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401 2026-03-08T21:58:24.543781732Z > 2026-03-08T21:58:26.339656117Z E0308 21:58:26.339599 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-08T21:58:26.339656117Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/apps.openshift.io/v1: 401 2026-03-08T21:58:26.339656117Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: 401 2026-03-08T21:58:26.339656117Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/build.openshift.io/v1: 401 2026-03-08T21:58:26.339656117Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/image.openshift.io/v1: 401 2026-03-08T21:58:26.339656117Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/project.openshift.io/v1: 401 2026-03-08T21:58:26.339656117Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/quota.openshift.io/v1: 401 2026-03-08T21:58:26.339656117Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401 2026-03-08T21:58:26.339656117Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401 2026-03-08T21:58:26.339656117Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401 2026-03-08T21:58:26.339656117Z > 2026-03-08T21:58:42.328208795Z I0308 21:58:42.328123 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="383888951626acf0033ee2c20bde5962947bb2ff05b5a6f75dc2a5c7500ccd92") 2026-03-08T21:58:42.328208795Z W0308 21:58:42.328168 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-08T21:58:42.328249596Z I0308 21:58:42.328210 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="bde996a4739669db8b9c828cdba27a084a0e71719ae6d5ac9a3c6f033334327c") 2026-03-08T21:58:42.328439332Z E0308 21:58:42.328399 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-08T21:58:42.328487473Z E0308 21:58:42.328465 1 leaderelection.go:436] error retrieving resource lock openshift-apiserver-operator/openshift-apiserver-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-08T21:58:42.328487473Z I0308 21:58:42.328481 1 leaderelection.go:297] failed to renew lease openshift-apiserver-operator/openshift-apiserver-operator-lock: timed out waiting for the condition 2026-03-08T21:58:42.328845422Z I0308 21:58:42.328791 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-08T21:58:42.328845422Z I0308 21:58:42.328814 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-08T21:58:42.329922390Z I0308 21:58:42.329901 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-03-08T21:58:42.329922390Z I0308 21:58:42.329914 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-03-08T21:58:42.329943501Z I0308 21:58:42.329922 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-08T21:58:42.329943501Z I0308 21:58:42.329929 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-08T21:58:42.330324990Z I0308 21:58:42.330287 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-08T21:58:42.330356701Z I0308 21:58:42.330338 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-08T21:58:42.330472634Z E0308 21:58:42.330448 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.template.openshift.io\": context canceled" 2026-03-08T21:58:42.330502295Z I0308 21:58:42.330479 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-03-08T21:58:42.330502295Z I0308 21:58:42.330495 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-03-08T21:58:42.330532626Z I0308 21:58:42.330505 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-03-08T21:58:42.330532626Z I0308 21:58:42.330514 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-03-08T21:58:42.330564776Z I0308 21:58:42.330539 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-03-08T21:58:42.330581547Z I0308 21:58:42.330567 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-08T21:58:42.330608738Z I0308 21:58:42.330590 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-03-08T21:58:42.330608738Z I0308 21:58:42.330599 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-03-08T21:58:42.330629168Z I0308 21:58:42.330614 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-03-08T21:58:42.330629168Z I0308 21:58:42.330625 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-08T21:58:42.330640008Z I0308 21:58:42.330635 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-03-08T21:58:42.330648209Z I0308 21:58:42.330637 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-08T21:58:42.330700970Z E0308 21:58:42.330682 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled" 2026-03-08T21:58:42.330711580Z I0308 21:58:42.330704 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-03-08T21:58:42.330767022Z I0308 21:58:42.330748 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-08T21:58:42.330810753Z I0308 21:58:42.330794 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-08T21:58:42.330810753Z I0308 21:58:42.330806 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-08T21:58:42.330942326Z E0308 21:58:42.330898 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:42.330942326Z I0308 21:58:42.330912 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-08T21:58:42.330942326Z I0308 21:58:42.330928 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-03-08T21:58:42.330942326Z I0308 21:58:42.330935 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-03-08T21:58:42.330956966Z I0308 21:58:42.330941 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-03-08T21:58:42.330956966Z I0308 21:58:42.330947 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-03-08T21:58:42.330956966Z I0308 21:58:42.330953 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-03-08T21:58:42.331398689Z I0308 21:58:42.331372 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-03-08T21:58:42.331398689Z I0308 21:58:42.331388 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-03-08T21:58:42.331419999Z I0308 21:58:42.331399 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-03-08T21:58:42.331419999Z I0308 21:58:42.331406 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-03-08T21:58:42.331419999Z I0308 21:58:42.331413 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-08T21:58:42.331450690Z I0308 21:58:42.331420 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-08T21:58:42.331498441Z I0308 21:58:42.331480 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-08T21:58:42.331498441Z I0308 21:58:42.331493 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-08T21:58:42.331511551Z I0308 21:58:42.330905 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-03-08T21:58:42.331521122Z I0308 21:58:42.331512 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-03-08T21:58:42.331521122Z I0308 21:58:42.331511 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-08T21:58:42.331573223Z I0308 21:58:42.331542 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-08T21:58:42.331656665Z I0308 21:58:42.331619 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-08T21:58:42.331656665Z I0308 21:58:42.331637 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-08T21:58:42.331656665Z I0308 21:58:42.331649 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-08T21:58:42.331820159Z I0308 21:58:42.331783 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T21:58:42.331820159Z I0308 21:58:42.331802 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-08T21:58:42.331820159Z I0308 21:58:42.331814 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T21:58:42.331836920Z I0308 21:58:42.331829 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-08T21:58:42.331846610Z I0308 21:58:42.331836 1 builder.go:335] server exited 2026-03-08T21:58:42.331889651Z I0308 21:58:42.331869 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-08T21:58:42.331989034Z I0308 21:58:42.331929 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-08T21:58:42.331989034Z I0308 21:58:42.331940 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-08T21:58:42.331989034Z I0308 21:58:42.331946 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-08T21:58:42.331989034Z I0308 21:58:42.331977 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-08T21:58:42.332027895Z I0308 21:58:42.332007 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3185247049/tls.crt::/tmp/serving-cert-3185247049/tls.key" 2026-03-08T21:58:42.332146978Z I0308 21:58:42.332110 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-03-08T21:58:42.332146978Z I0308 21:58:42.332122 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-03-08T21:58:42.332146978Z I0308 21:58:42.332132 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-08T21:58:42.332146978Z I0308 21:58:42.332138 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-03-08T21:58:42.332171868Z I0308 21:58:42.332145 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-08T21:58:42.332171868Z I0308 21:58:42.332151 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-08T21:58:42.332171868Z I0308 21:58:42.332160 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-03-08T21:58:42.332171868Z I0308 21:58:42.332165 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-03-08T21:58:42.332239720Z I0308 21:58:42.332219 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-08T21:58:42.332239720Z I0308 21:58:42.332229 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-08T21:58:42.332251880Z I0308 21:58:42.332240 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-03-08T21:58:42.332251880Z I0308 21:58:42.332246 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-03-08T21:58:42.332317682Z I0308 21:58:42.332298 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-03-08T21:58:42.332317682Z I0308 21:58:42.332314 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-03-08T21:58:42.332920168Z E0308 21:58:42.332894 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"v3.11.0/openshift-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled, \"v3.11.0/openshift-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:58:42.334095669Z I0308 21:58:42.334045 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-08T21:58:42.334115219Z I0308 21:58:42.334093 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-08T21:58:47.329019608Z I0308 21:58:47.328856 1 observer_polling.go:162] Shutting down file observer 2026-03-08T21:59:16.331677188Z E0308 21:59:16.331588 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T21:59:16.331880173Z W0308 21:59:16.331856 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-nqz5k.json0000640000000000000000000001443715153371026030323 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-799b6db4d7-nqz5k","generateName":"openshift-apiserver-operator-799b6db4d7-","namespace":"openshift-apiserver-operator","uid":"a8e00c74-fb72-4e3d-a22c-c38a4772a813","resourceVersion":"9436","creationTimestamp":"2026-03-08T21:56:08Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"799b6db4d7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-799b6db4d7","uid":"8b648f5b-9565-4b43-8b52-a8fb7cf091b5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-gwqqw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gwqqw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c12"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-03-08T21:57:18Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-08T22:00:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T21:57:31Z","finishedAt":"2026-03-08T21:59:16Z","containerID":"cri-o://334ebc87bbf952673cd1b3477f45396aaf813413e807f2bdfa8f48d87bc817d9"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","containerID":"cri-o://e72afc2085d471295428d0c6e91b91b2d9a4e2a26d7688d062fbd6d0d26453eb","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gwqqw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515153371026043040 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-2mspg2026-03-08T22:00:42.530595055Z I0308 22:00:42.530424 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-08T22:00:42.530595055Z I0308 22:00:42.530557 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T22:00:42.531004995Z I0308 22:00:42.530958 1 observer_polling.go:159] Starting file observer 2026-03-08T22:01:39.299918579Z I0308 22:01:39.299832 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202602132343.p2.gc7b5163.assembly.stream.el9-c7b5163-c7b51633b67e3e2860ca053930422f69e17bd40a 2026-03-08T22:01:39.697142543Z I0308 22:01:39.697023 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T22:01:39.697142543Z W0308 22:01:39.697067 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:39.697142543Z W0308 22:01:39.697102 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:39.697142543Z W0308 22:01:39.697112 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T22:01:39.697142543Z W0308 22:01:39.697116 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T22:01:39.697142543Z W0308 22:01:39.697119 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T22:01:39.697142543Z W0308 22:01:39.697125 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T22:01:39.702642356Z I0308 22:01:39.702567 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-08T22:01:39.702642356Z I0308 22:01:39.702624 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T22:01:39.702707417Z I0308 22:01:39.702641 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T22:01:39.702707417Z I0308 22:01:39.702670 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T22:01:39.703870716Z I0308 22:01:39.702785 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T22:01:39.703870716Z I0308 22:01:39.702871 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T22:01:39.703870716Z I0308 22:01:39.702877 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:01:39.703870716Z I0308 22:01:39.702887 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T22:01:39.703870716Z I0308 22:01:39.702892 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:39.704107473Z I0308 22:01:39.704050 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-08T22:01:39.704391481Z I0308 22:01:39.704355 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-03-08T22:01:39.809393294Z I0308 22:01:39.806307 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:39.809393294Z I0308 22:01:39.806359 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T22:01:39.809393294Z I0308 22:01:39.806455 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000004200515153371026043234 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-2mspg2026-03-08T21:58:13.055010374Z I0308 21:58:13.054933 1 request.go:700] Waited for 1.157978847s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-3-master-0 2026-03-08T21:58:14.067009166Z I0308 21:58:14.066675 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"c1dd5eae-3470-4c7f-874a-67687271c8cd", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing 2026-03-08T21:58:15.057226302Z I0308 21:58:15.057176 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Pending phase 2026-03-08T21:58:16.673146320Z I0308 21:58:16.671297 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Pending phase 2026-03-08T21:58:20.391560134Z I0308 21:58:20.390486 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Pending phase 2026-03-08T21:58:23.455834756Z I0308 21:58:23.455773 1 request.go:700] Waited for 1.147518334s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/services/scheduler 2026-03-08T21:58:24.276116705Z I0308 21:58:24.261338 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-08T21:58:25.656146562Z I0308 21:58:25.656020 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-08T21:58:26.858505632Z I0308 21:58:26.858462 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-08T21:58:56.870274247Z I0308 21:58:56.865499 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="1938f23644d79c32c53cd95a2a4436890a85829493d9a87356ef4e5943538a4b") 2026-03-08T21:58:56.870274247Z W0308 21:58:56.865572 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-08T21:58:56.870274247Z I0308 21:58:56.865630 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="7e76bb5bb79e3828c308abc61d93249028f1a9c929d1da616aa685bdb320228a") 2026-03-08T21:58:56.870566994Z E0308 21:58:56.870500 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-08T21:58:56.870663796Z E0308 21:58:56.870617 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-08T21:58:56.870663796Z I0308 21:58:56.870647 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: timed out waiting for the condition 2026-03-08T21:58:56.871310282Z I0308 21:58:56.871253 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-08T21:58:56.871310282Z I0308 21:58:56.871300 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-08T21:58:56.871441135Z I0308 21:58:56.871379 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-08T21:58:56.871441135Z I0308 21:58:56.871409 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-08T21:58:56.871441135Z I0308 21:58:56.871415 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-08T21:58:56.871463166Z I0308 21:58:56.871409 1 base_controller.go:181] Shutting down GuardController ... 2026-03-08T21:58:56.871463166Z I0308 21:58:56.871446 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-08T21:58:56.871522567Z I0308 21:58:56.871473 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T21:58:56.873498438Z I0308 21:58:56.871478 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-08T21:58:56.873526519Z I0308 21:58:56.871497 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-08T21:58:56.875157700Z I0308 21:58:56.871513 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-08T21:58:56.875363365Z I0308 21:58:56.871523 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-08T21:58:56.875473337Z I0308 21:58:56.871535 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-08T21:58:56.875691113Z I0308 21:58:56.871556 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-08T21:58:56.875691113Z I0308 21:58:56.875677 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-08T21:58:56.875712713Z I0308 21:58:56.875134 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-08T21:58:56.875725374Z I0308 21:58:56.871569 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-08T21:58:56.875738064Z I0308 21:58:56.875724 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-08T21:58:56.875751444Z I0308 21:58:56.875739 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-08T21:58:56.875751444Z I0308 21:58:56.871578 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-08T21:58:56.875766585Z I0308 21:58:56.875755 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-08T21:58:56.875766585Z I0308 21:58:56.871629 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-08T21:58:56.875820577Z I0308 21:58:56.871624 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T21:58:56.875820577Z I0308 21:58:56.871646 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-08T21:58:56.875835417Z E0308 21:58:56.875806 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:58:56.875857518Z I0308 21:58:56.871670 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-08T21:58:56.875871078Z I0308 21:58:56.875860 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-08T21:58:56.875886359Z I0308 21:58:56.871722 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-08T21:58:56.875897499Z I0308 21:58:56.875882 1 controller_manager.go:54] GuardController controller terminated 2026-03-08T21:58:56.875908589Z I0308 21:58:56.871741 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-08T21:58:56.875942750Z I0308 21:58:56.871756 1 base_controller.go:181] Shutting down Installer ... 2026-03-08T21:58:56.875942750Z I0308 21:58:56.875919 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-08T21:58:56.875956090Z I0308 21:58:56.875945 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-08T21:58:56.875956090Z I0308 21:58:56.871772 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-08T21:58:56.875967631Z I0308 21:58:56.871786 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-08T21:58:56.875978531Z I0308 21:58:56.871791 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-08T21:58:56.876011072Z I0308 21:58:56.871796 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-08T21:58:56.876061533Z I0308 21:58:56.871813 1 base_controller.go:181] Shutting down PruneController ... 2026-03-08T21:58:56.876061533Z I0308 21:58:56.871836 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-08T21:58:56.876131025Z I0308 21:58:56.876104 1 base_controller.go:113] All Installer workers have been terminated 2026-03-08T21:58:56.876150545Z I0308 21:58:56.876129 1 controller_manager.go:54] Installer controller terminated 2026-03-08T21:58:56.876150545Z I0308 21:58:56.871833 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-08T21:58:56.876165385Z I0308 21:58:56.876156 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-08T21:58:56.876179896Z I0308 21:58:56.876169 1 controller_manager.go:54] PruneController controller terminated 2026-03-08T21:58:56.876191636Z I0308 21:58:56.871882 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-08T21:58:56.876203006Z I0308 21:58:56.871893 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-08T21:58:56.876203006Z I0308 21:58:56.871931 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-08T21:58:56.876244327Z I0308 21:58:56.876219 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-08T21:58:56.876293619Z I0308 21:58:56.872045 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2911002322/tls.crt::/tmp/serving-cert-2911002322/tls.key" 2026-03-08T21:58:56.876328069Z I0308 21:58:56.872102 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-08T21:58:56.876348900Z I0308 21:58:56.876327 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-08T21:58:56.876360190Z I0308 21:58:56.872147 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-08T21:58:56.876371040Z E0308 21:58:56.872172 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-08T21:58:56.876382201Z I0308 21:58:56.872202 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-08T21:58:56.876393071Z I0308 21:58:56.876381 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-08T21:58:56.876404021Z I0308 21:58:56.876391 1 controller_manager.go:54] RevisionController controller terminated 2026-03-08T21:58:56.876404021Z I0308 21:58:56.872216 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-08T21:58:56.876415302Z I0308 21:58:56.872233 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-08T21:58:56.876425972Z I0308 21:58:56.876417 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-08T21:58:56.876469383Z I0308 21:58:56.876446 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-08T21:58:56.876469383Z I0308 21:58:56.872248 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-08T21:58:56.876516784Z I0308 21:58:56.876491 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-08T21:58:56.876516784Z I0308 21:58:56.876512 1 builder.go:335] server exited 2026-03-08T21:58:56.876529094Z I0308 21:58:56.872532 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-08T21:58:56.876542785Z I0308 21:58:56.876532 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-08T21:58:56.876554255Z I0308 21:58:56.876543 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-08T21:58:56.876554255Z E0308 21:58:56.873394 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/svc.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/services/scheduler\": context canceled, \"assets/kube-scheduler/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:58:56.876568415Z E0308 21:58:56.873398 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:56.877422827Z E0308 21:58:56.877385 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:56.877422827Z I0308 21:58:56.877399 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-08T21:58:56.877452028Z I0308 21:58:56.877424 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-08T21:58:56.877452028Z I0308 21:58:56.877433 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-08T21:58:56.877613962Z I0308 21:58:56.877584 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-08T21:58:56.877629552Z I0308 21:58:56.877622 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-08T21:58:56.877643193Z I0308 21:58:56.877634 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-08T21:58:56.877681274Z I0308 21:58:56.877645 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-08T21:58:56.877681274Z I0308 21:58:56.877676 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-08T21:58:56.877875429Z I0308 21:58:56.877848 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-08T21:58:56.877875429Z I0308 21:58:56.877867 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-08T21:58:56.877892159Z I0308 21:58:56.877882 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-08T21:58:56.879313815Z I0308 21:58:56.879287 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-08T21:58:56.879383637Z I0308 21:58:56.879369 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-08T21:59:01.865399548Z I0308 21:59:01.865310 1 observer_polling.go:162] Shutting down file observer 2026-03-08T21:59:30.875855213Z E0308 21:59:30.875739 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T21:59:30.875855213Z W0308 21:59:30.875780 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-2mspg.json0000640000000000000000000001365715153371026032103 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-5c74bfc494-2mspg","generateName":"openshift-kube-scheduler-operator-5c74bfc494-","namespace":"openshift-kube-scheduler-operator","uid":"f6fbc12f-3c27-4a7a-933f-43a55c960335","resourceVersion":"9438","creationTimestamp":"2026-03-08T21:56:09Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"5c74bfc494"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-5c74bfc494","uid":"d88a0b62-f5b9-4c4b-ab16-4a92166c041c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-08T21:57:18Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-08T22:00:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T21:57:31Z","finishedAt":"2026-03-08T21:59:30Z","containerID":"cri-o://fa11530abd773575590a911f848030e060ab34b160f17f0ed7e7dadcd26f2550"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://9e2fd1210b8809e9723f044551eadfefcc58034be22d2af001446424e236d937","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-3-master-0/installer_current.log0000640000000000000000000001462715153371026027174 0ustar00000000000000002026-03-08T21:58:22.238516327Z I0308 21:58:22.238273 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000a67e00 cert-secrets:0xc000a67b80 configmaps:0xc000a67720 namespace:0xc000a67540 optional-configmaps:0xc000a67860 optional-secrets:0xc000a677c0 pod:0xc000a675e0 pod-manifest-dir:0xc000a679a0 resource-dir:0xc000a67900 revision:0xc000a674a0 secrets:0xc000a67680 v:0xc000b3a780] [0xc000b3a780 0xc000a674a0 0xc000a67540 0xc000a675e0 0xc000a67900 0xc000a679a0 0xc000a67720 0xc000a67860 0xc000a677c0 0xc000a67680 0xc000a67e00 0xc000a67b80] [] map[cert-configmaps:0xc000a67c20 cert-dir:0xc000a67e00 cert-secrets:0xc000a67b80 configmaps:0xc000a67720 help:0xc000b3ab40 kubeconfig:0xc000a67400 log-flush-frequency:0xc000b3a6e0 namespace:0xc000a67540 optional-cert-configmaps:0xc000a67d60 optional-cert-secrets:0xc000a67cc0 optional-configmaps:0xc000a67860 optional-secrets:0xc000a677c0 pod:0xc000a675e0 pod-manifest-dir:0xc000a679a0 pod-manifests-lock-file:0xc000a67ae0 resource-dir:0xc000a67900 revision:0xc000a674a0 secrets:0xc000a67680 timeout-duration:0xc000a67a40 v:0xc000b3a780 vmodule:0xc000b3a820] [0xc000a67400 0xc000a674a0 0xc000a67540 0xc000a675e0 0xc000a67680 0xc000a67720 0xc000a677c0 0xc000a67860 0xc000a67900 0xc000a679a0 0xc000a67a40 0xc000a67ae0 0xc000a67b80 0xc000a67c20 0xc000a67cc0 0xc000a67d60 0xc000a67e00 0xc000b3a6e0 0xc000b3a780 0xc000b3a820 0xc000b3ab40] [0xc000a67c20 0xc000a67e00 0xc000a67b80 0xc000a67720 0xc000b3ab40 0xc000a67400 0xc000b3a6e0 0xc000a67540 0xc000a67d60 0xc000a67cc0 0xc000a67860 0xc000a677c0 0xc000a675e0 0xc000a679a0 0xc000a67ae0 0xc000a67900 0xc000a674a0 0xc000a67680 0xc000a67a40 0xc000b3a780 0xc000b3a820] map[104:0xc000b3ab40 118:0xc000b3a780] [] -1 0 0xc000b25440 true 0x223d9a0 []} 2026-03-08T21:58:22.238516327Z I0308 21:58:22.238503 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0004ae680)({ 2026-03-08T21:58:22.238516327Z KubeConfig: (string) "", 2026-03-08T21:58:22.238516327Z KubeClient: (kubernetes.Interface) , 2026-03-08T21:58:22.238516327Z Revision: (string) (len=1) "3", 2026-03-08T21:58:22.238516327Z NodeName: (string) "", 2026-03-08T21:58:22.238516327Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-08T21:58:22.238516327Z Clock: (clock.RealClock) { 2026-03-08T21:58:22.238516327Z }, 2026-03-08T21:58:22.238516327Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-08T21:58:22.238516327Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T21:58:22.238516327Z (string) (len=31) "localhost-recovery-client-token" 2026-03-08T21:58:22.238516327Z }, 2026-03-08T21:58:22.238516327Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T21:58:22.238516327Z (string) (len=12) "serving-cert" 2026-03-08T21:58:22.238516327Z }, 2026-03-08T21:58:22.238516327Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-08T21:58:22.238516327Z (string) (len=18) "kube-scheduler-pod", 2026-03-08T21:58:22.238516327Z (string) (len=6) "config", 2026-03-08T21:58:22.238516327Z (string) (len=17) "serviceaccount-ca", 2026-03-08T21:58:22.238516327Z (string) (len=20) "scheduler-kubeconfig", 2026-03-08T21:58:22.238516327Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-08T21:58:22.238516327Z }, 2026-03-08T21:58:22.238516327Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T21:58:22.238516327Z (string) (len=16) "policy-configmap" 2026-03-08T21:58:22.238516327Z }, 2026-03-08T21:58:22.238516327Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-08T21:58:22.238516327Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-08T21:58:22.238516327Z }, 2026-03-08T21:58:22.238516327Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-08T21:58:22.238516327Z CertConfigMapNamePrefixes: ([]string) , 2026-03-08T21:58:22.238516327Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-08T21:58:22.238516327Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-08T21:58:22.238516327Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-08T21:58:22.238516327Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-08T21:58:22.238516327Z Timeout: (time.Duration) 2m0s, 2026-03-08T21:58:22.238516327Z StaticPodManifestsLockFile: (string) "", 2026-03-08T21:58:22.238516327Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-08T21:58:22.238516327Z KubeletVersion: (string) "" 2026-03-08T21:58:22.238516327Z }) 2026-03-08T21:58:22.258122536Z I0308 21:58:22.257650 1 cmd.go:413] Getting controller reference for node master-0 2026-03-08T21:58:22.303130556Z I0308 21:58:22.302479 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-08T21:58:22.303130556Z I0308 21:58:22.302535 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T21:58:22.303130556Z I0308 21:58:22.302545 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T21:58:22.326010541Z I0308 21:58:22.325598 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-08T21:58:46.329283775Z W0308 21:58:46.329151 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T21:59:06.330018488Z W0308 21:59:06.329920 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T21:59:26.329578998Z W0308 21:59:26.329413 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T21:59:40.329940948Z W0308 21:59:40.329794 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": context deadline exceeded 2026-03-08T21:59:40.329940948Z F0308 21:59:40.329878 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-scheduler/installer-3-master-0.json0000640000000000000000000001633215153371026022654 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-scheduler","uid":"c633355a-b323-4458-8ecb-1e490d115f59","resourceVersion":"9473","creationTimestamp":"2026-03-08T21:58:14Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.49/23\"],\"mac_address\":\"0a:58:0a:80:00:31\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.49/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.49\"\n ],\n \"mac\": \"0a:58:0a:80:00:31\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"b35a2e62-bd8e-4ca8-aa8a-58aa00a2c133"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:00:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:14Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:00:41Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:00:41Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:14Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.49","podIPs":[{"ip":"10.128.0.49"}],"startTime":"2026-03-08T21:58:14Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0308 21:58:22.257650 1 cmd.go:413] Getting controller reference for node master-0\nI0308 21:58:22.302479 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0308 21:58:22.302535 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0308 21:58:22.302545 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0308 21:58:22.325598 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0308 21:58:46.329151 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0308 21:59:06.329920 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0308 21:59:26.329413 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0308 21:59:40.329794 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": context deadline exceeded\nF0308 21:59:40.329878 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-08T21:58:21Z","finishedAt":"2026-03-08T21:59:40Z","containerID":"cri-o://28682516e11b7da515d28696337779453c2c96bd4cf9bfd8a8b3aa00aef7307b"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://28682516e11b7da515d28696337779453c2c96bd4cf9bfd8a8b3aa00aef7307b","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004521015153371026030222 0ustar00000000000000002026-03-08T21:59:50.054430251Z - name: NodeVolumeLimits 2026-03-08T21:59:50.054430251Z weight: 0 2026-03-08T21:59:50.054430251Z - name: VolumeBinding 2026-03-08T21:59:50.054430251Z weight: 0 2026-03-08T21:59:50.054430251Z - name: VolumeZone 2026-03-08T21:59:50.054430251Z weight: 0 2026-03-08T21:59:50.054430251Z - name: PodTopologySpread 2026-03-08T21:59:50.054430251Z weight: 2 2026-03-08T21:59:50.054430251Z - name: InterPodAffinity 2026-03-08T21:59:50.054430251Z weight: 2 2026-03-08T21:59:50.054430251Z - name: DefaultPreemption 2026-03-08T21:59:50.054430251Z weight: 0 2026-03-08T21:59:50.054430251Z - name: NodeResourcesBalancedAllocation 2026-03-08T21:59:50.054430251Z weight: 1 2026-03-08T21:59:50.054430251Z - name: ImageLocality 2026-03-08T21:59:50.054430251Z weight: 1 2026-03-08T21:59:50.054430251Z - name: DefaultBinder 2026-03-08T21:59:50.054430251Z weight: 0 2026-03-08T21:59:50.054430251Z permit: {} 2026-03-08T21:59:50.054430251Z postBind: {} 2026-03-08T21:59:50.054430251Z postFilter: {} 2026-03-08T21:59:50.054430251Z preBind: {} 2026-03-08T21:59:50.054430251Z preEnqueue: {} 2026-03-08T21:59:50.054430251Z preFilter: {} 2026-03-08T21:59:50.054430251Z preScore: {} 2026-03-08T21:59:50.054430251Z queueSort: {} 2026-03-08T21:59:50.054430251Z reserve: {} 2026-03-08T21:59:50.054430251Z score: {} 2026-03-08T21:59:50.054430251Z schedulerName: default-scheduler 2026-03-08T21:59:50.054430251Z > 2026-03-08T21:59:50.058091974Z I0308 21:59:50.058003 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-08T21:59:50.058091974Z I0308 21:59:50.058033 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-08T21:59:50.060316190Z I0308 21:59:50.060228 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T21:59:50.060347091Z I0308 21:59:50.060324 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T21:59:50.060500815Z I0308 21:59:50.060457 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773007129\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773007129\" (2026-03-08 20:58:49 +0000 UTC to 2027-03-08 20:58:49 +0000 UTC (now=2026-03-08 21:59:50.060436313 +0000 UTC))" 2026-03-08T21:59:50.060664949Z I0308 21:59:50.060607 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773007130\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773007129\" (2026-03-08 20:58:49 +0000 UTC to 2029-03-08 20:58:49 +0000 UTC (now=2026-03-08 21:59:50.060592007 +0000 UTC))" 2026-03-08T21:59:50.060680729Z I0308 21:59:50.060670 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-08T21:59:50.060736901Z I0308 21:59:50.060628 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-08T21:59:50.061207212Z I0308 21:59:50.061162 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T21:59:50.065972213Z I0308 21:59:50.065886 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.065972213Z I0308 21:59:50.065896 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.066066356Z I0308 21:59:50.066024 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.066777223Z I0308 21:59:50.066715 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.068100207Z I0308 21:59:50.067112 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-08T21:59:50.068100207Z I0308 21:59:50.067450 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.068100207Z I0308 21:59:50.067959 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.068249551Z I0308 21:59:50.068201 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.069577124Z I0308 21:59:50.069546 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.069923763Z I0308 21:59:50.069867 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.070217481Z I0308 21:59:50.070115 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-08T21:59:50.070892698Z I0308 21:59:50.070771 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.072297673Z I0308 21:59:50.072238 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.076322345Z I0308 21:59:50.076266 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.079657999Z I0308 21:59:50.078920 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.089762225Z I0308 21:59:50.089655 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.093690274Z I0308 21:59:50.093588 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-08T21:59:50.161457689Z I0308 21:59:50.161347 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T21:59:50.161522261Z I0308 21:59:50.161454 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-08T21:59:50.161841569Z I0308 21:59:50.161781 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 21:40:59 +0000 UTC to 2036-03-05 21:40:59 +0000 UTC (now=2026-03-08 21:59:50.161751607 +0000 UTC))" 2026-03-08T21:59:50.161841569Z I0308 21:59:50.161828 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-08 21:47:40 +0000 UTC to 2026-03-09 21:47:40 +0000 UTC (now=2026-03-08 21:59:50.161820908 +0000 UTC))" 2026-03-08T21:59:50.161869959Z I0308 21:59:50.161848 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-08 21:47:40 +0000 UTC to 2027-03-08 21:47:40 +0000 UTC (now=2026-03-08 21:59:50.161841029 +0000 UTC))" 2026-03-08T21:59:50.161917851Z I0308 21:59:50.161878 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-08 21:47:41 +0000 UTC to 2027-03-08 21:47:41 +0000 UTC (now=2026-03-08 21:59:50.161871049 +0000 UTC))" 2026-03-08T21:59:50.161917851Z I0308 21:59:50.161904 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 21:47:38 +0000 UTC to 2036-03-05 21:47:38 +0000 UTC (now=2026-03-08 21:59:50.1618978 +0000 UTC))" 2026-03-08T21:59:50.162231238Z I0308 21:59:50.162148 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773007129\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773007129\" (2026-03-08 20:58:49 +0000 UTC to 2027-03-08 20:58:49 +0000 UTC (now=2026-03-08 21:59:50.162136516 +0000 UTC))" 2026-03-08T21:59:50.162360472Z I0308 21:59:50.162318 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773007130\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773007129\" (2026-03-08 20:58:49 +0000 UTC to 2029-03-08 20:58:49 +0000 UTC (now=2026-03-08 21:59:50.16230865 +0000 UTC))" 2026-03-08T21:59:55.162466532Z E0308 21:59:55.162266 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:02.522991019Z E0308 22:00:02.522839 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:10.619701244Z E0308 22:00:10.619584 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:17.754586538Z E0308 22:00:17.754433 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:26.461734567Z E0308 22:00:26.461544 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:35.050247018Z E0308 22:00:35.050120 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:43.571912141Z E0308 22:00:43.571784 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:52.483300708Z E0308 22:00:52.483151 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:01:00.064872215Z E0308 22:01:00.064748 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:01:08.149166328Z E0308 22:01:08.149021 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:01:16.365470864Z E0308 22:01:16.365357 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:01:25.072038636Z E0308 22:01:25.071869 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:01:44.345044192Z I0308 22:01:44.344938 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-08T22:01:44.346122500Z I0308 22:01:44.345987 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-4fsdl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T22:01:44.346532200Z I0308 22:01:44.346469 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kx9pl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T22:01:44.346808877Z I0308 22:01:44.346752 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-qf2dp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T22:01:45.137466938Z I0308 22:01:45.135791 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-mg95b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:01:45.145879985Z I0308 22:01:45.143855 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-8ctpt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:01.645133298Z I0308 22:02:01.645039 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-84bf6db4f9-64gfj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:01.660205048Z I0308 22:02:01.645362 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-fdb5c78b5-m7phf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:01.660205048Z I0308 22:02:01.645573 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-kmbpx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:01.740915713Z I0308 22:02:01.740493 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-f988cd549-68kmh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:02.037299191Z I0308 22:02:02.037169 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-754bdc9f9d-stxvg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:06.117972275Z I0308 22:02:06.117885 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-q669r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:11.351378024Z I0308 22:02:11.350519 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-ff46b7bdf-zn77m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:15.159429523Z I0308 22:02:15.155626 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-79f8cd6fdd-4fsdl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:15.171804583Z I0308 22:02:15.170152 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kx9pl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:15.171804583Z I0308 22:02:15.171036 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-qf2dp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:17.873751220Z I0308 22:02:17.873579 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-svxwz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:19.403891969Z I0308 22:02:19.402946 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496-t2sgh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:19.596910756Z I0308 22:02:19.596797 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-5ff8674d55-jd2m9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:25.002149744Z I0308 22:02:24.997545 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/openshift-state-metrics-74cc79fd76-8rbn8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:25.067959035Z I0308 22:02:25.064877 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/node-exporter-l8k5g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:25.090597869Z I0308 22:02:25.086967 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/kube-state-metrics-68b88f8cb5-wznvc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T22:02:30.526552513Z I0308 22:02:30.526453 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/metrics-server-f5876b8d7-2222x" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006463115153371026030424 0ustar00000000000000002026-03-08T21:56:08.013835102Z I0308 21:56:08.013702 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-64bf9778cb-5ljhh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:08.112357067Z I0308 21:56:08.112218 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-xqh7x" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:08.224379332Z I0308 21:56:08.224186 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7c649bf6d4-znt8q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:08.313759834Z I0308 21:56:08.313549 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-x5zxr" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:08.413463849Z I0308 21:56:08.413324 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-zk8sw" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:08.511421278Z I0308 21:56:08.511212 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-pkcp5" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:08.614287412Z I0308 21:56:08.614123 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-c4lpf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:08.717995137Z I0308 21:56:08.717876 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-mnf25" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:08.812873299Z I0308 21:56:08.812679 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-nl9qg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:08.911491985Z I0308 21:56:08.911366 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-nqz5k" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:09.020486074Z I0308 21:56:09.019359 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-745944c6b7-d8fd8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:09.112959815Z I0308 21:56:09.112833 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-8h8fx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:09.210289409Z I0308 21:56:09.210061 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-2mspg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:10.511213920Z I0308 21:56:10.511042 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-kxkrl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:15.534256999Z I0308 21:56:15.534173 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-zgm9p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:25.425952252Z I0308 21:56:25.425860 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-l8ltx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:25.622319346Z I0308 21:56:25.622156 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-74fmb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:26.416956531Z I0308 21:56:26.416836 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-lqdbv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:28.411485735Z I0308 21:56:28.411293 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-8d675b596-ddw98" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:37.819816322Z I0308 21:56:37.819718 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-66b55d57d-ngrjm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:38.024456409Z I0308 21:56:38.024332 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-5m5qr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:40.008631344Z I0308 21:56:40.008343 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-qf2dp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:56:41.002786427Z I0308 21:56:41.000765 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-djlff" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:56:43.610571701Z I0308 21:56:43.610424 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-trhtl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:07.050839252Z I0308 21:57:07.050609 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-g4d2r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.253531144Z I0308 21:57:18.253111 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-x8jg8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.255290169Z I0308 21:57:18.253812 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-64488f9d78-krpfs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.255290169Z I0308 21:57:18.253954 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-bh88w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.255290169Z I0308 21:57:18.254124 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-8pqc2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.255290169Z I0308 21:57:18.254243 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-xqh7x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.255290169Z I0308 21:57:18.254360 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-589895fbb7-wtvp5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.266946 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-g2ddr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.267398 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-8h8fx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.267581 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-mt484" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.267588 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-nl9qg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.267722 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-nqz5k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.267757 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-x5zxr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.267744 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-2mspg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.267918 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-6q5t2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.267975 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-677db989d6-cjdgr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268154064Z I0308 21:57:18.268130 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-zk8sw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268886083Z I0308 21:57:18.268487 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-mww2c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268886083Z I0308 21:57:18.268685 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-mnf25" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.268886083Z I0308 21:57:18.268860 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-pkcp5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.272133068Z I0308 21:57:18.269023 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-8d675b596-ddw98" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.272133068Z I0308 21:57:18.269219 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-c4lpf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.293131984Z I0308 21:57:18.290962 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-64bf9778cb-5ljhh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:18.316825149Z I0308 21:57:18.315311 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-pwn9k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:32.733181266Z I0308 21:57:32.731912 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-57ccdf9b5-bf6ws" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:33.409703088Z I0308 21:57:33.408801 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-wklhr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:33.525127628Z I0308 21:57:33.524974 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6f7fd6c796-7f7b4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:33.646139074Z I0308 21:57:33.637596 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-58959cd4d6-k8jj7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:35.188591882Z I0308 21:57:35.188509 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6b6749f888-scv45" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:57:35.203325175Z I0308 21:57:35.203212 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-685b849569-wt9mn" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:57:35.272417251Z I0308 21:57:35.272314 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-84bfdbbb7f-b8zkz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:37.055594436Z I0308 21:57:37.055537 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-754785bd46-4kk54" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:57:37.108925352Z I0308 21:57:37.108871 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-685b849569-wt9mn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:38.563029336Z I0308 21:57:38.562975 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-754785bd46-4kk54" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:38.966940183Z I0308 21:57:38.966885 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-c4db5b54-m7wjt" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:57:40.120536425Z I0308 21:57:40.120457 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-c4db5b54-m7wjt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:44.578172261Z I0308 21:57:44.576330 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-648655b4b4-k22kr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:49.279165571Z I0308 21:57:49.277878 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-rxbl5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:51.578143053Z I0308 21:57:51.577007 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-6f9445b8fd-w44n6" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:57:52.176427042Z I0308 21:57:52.176351 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5bf6f788bb-vmt9n" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:57:52.215708123Z I0308 21:57:52.215308 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-6584845c9c-w4jhq" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:57:53.184589695Z I0308 21:57:53.183592 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5bf6f788bb-vmt9n" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:57:53.192098710Z I0308 21:57:53.192025 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-6f9445b8fd-w44n6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:53.569398926Z I0308 21:57:53.566804 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-6584845c9c-w4jhq" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:57:55.583235297Z I0308 21:57:55.580888 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-6584845c9c-w4jhq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:55.592392195Z I0308 21:57:55.591803 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5bf6f788bb-vmt9n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:57.461705909Z I0308 21:57:57.452727 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-kx9pl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:57:57.712907568Z I0308 21:57:57.712823 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-65ts8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:58.100611555Z I0308 21:57:58.100531 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-6bf768964c-srxfg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:58.358983829Z I0308 21:57:58.355588 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-qdc2p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:57:58.588369703Z I0308 21:57:58.588314 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-4fsdl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-08T21:58:00.837147938Z I0308 21:58:00.834152 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-qv4bv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:00.931162421Z I0308 21:58:00.928295 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-nk294" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:04.388595601Z I0308 21:58:04.388536 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-8c9c967c7-ln9l2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:12.384148088Z I0308 21:58:12.384041 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-f7df5f5b-txsrq" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:58:12.484045324Z I0308 21:58:12.481879 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-86888d445f-7f74k" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-08T21:58:13.595030810Z I0308 21:58:13.594738 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-86888d445f-7f74k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:13.598988793Z I0308 21:58:13.597316 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-f7df5f5b-txsrq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:20.747993898Z I0308 21:58:20.747878 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6686554ddc-c246n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:22.280386615Z I0308 21:58:22.280294 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-955fcfb87-tn4pc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:23.311258028Z I0308 21:58:23.311180 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-8k5md" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:23.470260521Z I0308 21:58:23.468865 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-w7p5f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:24.854216750Z I0308 21:58:24.853389 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-jcrxj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:25.062124324Z I0308 21:58:25.059391 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47-mfqlz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:25.536394481Z I0308 21:58:25.536041 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85-mkvtk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:26.253463137Z I0308 21:58:26.253233 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-8w7wm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:26.732592160Z I0308 21:58:26.731953 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598-xwmmm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:27.162761470Z I0308 21:58:27.161668 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-69576476f7-dvgxg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:27.641175544Z I0308 21:58:27.638801 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-8f89dfddd-fn4ck" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:27.699398667Z I0308 21:58:27.696745 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f-p68k6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:27.863096992Z I0308 21:58:27.862220 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-47cmq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-08T21:58:34.271001326Z E0308 21:58:34.270878 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-08T21:58:39.270663429Z E0308 21:58:39.270567 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-08T21:58:39.270663429Z I0308 21:58:39.270633 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-08T21:58:44.272000495Z E0308 21:58:44.271923 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T21:58:44.272000495Z E0308 21:58:44.271980 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515153371026023007 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"1afc5fac-19ba-494c-9b2b-7ababa7d5e73","resourceVersion":"9408","creationTimestamp":"2026-03-08T21:57:00Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.mirror":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.seen":"2026-03-08T21:55:33.028619015Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"0ddb8058-8075-483a-b934-fc2452244c0b","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:50Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:50Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T21:57:30Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-08T21:58:49Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-08T21:55:43Z","finishedAt":"2026-03-08T21:58:44Z","containerID":"cri-o://f50874fd44a38fe2052c0dd021aa5c5eab2b987367eeee5b46f35dae49f0f668"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://b6b246bb81907eac732c126403c542413078697b3a057b896aee540f8c7e39d9","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000012323715153371026034223 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-08T21:56:22.683275857Z I0308 21:56:22.683127 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-03-08T21:56:23.581061120Z I0308 21:56:23.580958 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-08T21:56:23.783350815Z I0308 21:56:23.783252 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-08T21:56:24.298739891Z I0308 21:56:24.298645 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-03-08T21:56:24.298907835Z I0308 21:56:24.298862 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-03-08T21:56:24.298925786Z I0308 21:56:24.298915 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-03-08T21:56:24.299005848Z I0308 21:56:24.298966 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-03-08T21:56:24.299022528Z I0308 21:56:24.299005 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-03-08T21:56:24.314389303Z I0308 21:56:24.314333 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:56:24.332649765Z I0308 21:56:24.332547 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:56:24.350915747Z I0308 21:56:24.350833 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:56:24.366692583Z I0308 21:56:24.366619 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:56:24.399803155Z I0308 21:56:24.399710 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-08T21:56:27.261850119Z W0308 21:56:27.261789 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-08T21:56:27.261912001Z E0308 21:56:27.261845 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-08T21:56:29.409652056Z I0308 21:56:29.409588 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-03-08T21:56:37.388178185Z I0308 21:56:37.388101 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-03-08T21:56:38.596266446Z I0308 21:56:38.596150 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-03-08T21:56:41.800927726Z I0308 21:56:41.800844 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-03-08T21:56:42.177727211Z I0308 21:56:42.177460 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-03-08T21:56:42.579332239Z I0308 21:56:42.579203 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-03-08T21:56:47.174645682Z E0308 21:56:47.174581 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: 8e38c36a-18db-4b22-9f02-acdf85ae1e15, UID in object meta: , falling back to slow path 2026-03-08T21:56:54.410533306Z I0308 21:56:54.410462 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks], removed: [] 2026-03-08T21:56:54.410802153Z I0308 21:56:54.410779 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-03-08T21:56:54.410929747Z I0308 21:56:54.410911 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-03-08T21:56:54.410994818Z I0308 21:56:54.410977 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-03-08T21:56:54.411057080Z I0308 21:56:54.411040 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-03-08T21:56:54.411222634Z I0308 21:56:54.411202 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-03-08T21:56:54.414539950Z I0308 21:56:54.414457 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:56:54.414591321Z I0308 21:56:54.414470 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:56:54.416194103Z I0308 21:56:54.416114 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:56:54.417240000Z I0308 21:56:54.417204 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:56:54.418153765Z I0308 21:56:54.418127 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:56:54.512524167Z I0308 21:56:54.512419 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-08T21:57:07.133909391Z W0308 21:57:07.133812 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-08T21:57:07.133909391Z E0308 21:57:07.133871 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-08T21:57:32.489510562Z I0308 21:57:32.488297 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-03-08T21:57:32.653812252Z I0308 21:57:32.653625 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-03-08T21:57:32.686942664Z I0308 21:57:32.686607 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-03-08T21:57:33.642326654Z I0308 21:57:33.642249 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-03-08T21:57:37.308885060Z I0308 21:57:37.308780 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-03-08T21:57:39.637629144Z I0308 21:57:39.636842 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:57:40.469573187Z I0308 21:57:40.469482 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-03-08T21:57:43.309382204Z I0308 21:57:43.308095 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-03-08T21:57:46.994460311Z W0308 21:57:46.994269 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-08T21:57:46.994460311Z E0308 21:57:46.994325 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-08T21:57:51.531600773Z I0308 21:57:51.531518 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-03-08T21:57:51.558420200Z I0308 21:57:51.557679 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-03-08T21:57:51.574503348Z I0308 21:57:51.574428 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-03-08T21:57:54.528895594Z I0308 21:57:54.528842 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-03-08T21:57:54.529094339Z I0308 21:57:54.529059 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-03-08T21:57:54.531321507Z I0308 21:57:54.531296 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T21:57:54.629616281Z I0308 21:57:54.629379 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-08T21:57:57.007119644Z I0308 21:57:57.006471 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-k5ntx" has been approved 2026-03-08T21:57:57.045136082Z I0308 21:57:57.043690 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-vrflq" has been approved 2026-03-08T21:57:57.476294588Z I0308 21:57:57.476171 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-03-08T21:57:57.918281105Z I0308 21:57:57.918128 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-08T21:57:58.390939550Z I0308 21:57:58.390749 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-03-08T21:58:02.245622054Z I0308 21:58:02.245498 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-08T21:58:09.677066811Z I0308 21:58:09.676983 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-03-08T21:58:09.705376086Z I0308 21:58:09.705263 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-03-08T21:58:22.564647013Z I0308 21:58:22.564584 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found 2026-03-08T21:58:24.112212655Z I0308 21:58:24.110976 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-03-08T21:58:24.635860915Z I0308 21:58:24.635739 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T21:58:24.635897505Z E0308 21:58:24.635853 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-08T21:58:25.651168853Z I0308 21:58:25.651066 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-08T21:58:26.763510393Z I0308 21:58:26.762659 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-08T21:58:46.498930244Z W0308 21:58:46.498827 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-08T21:58:46.498930244Z E0308 21:58:46.498903 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-08T21:58:54.651481559Z I0308 21:58:54.651309 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T21:58:54.651481559Z E0308 21:58:54.651457 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-08T21:59:16.982310230Z W0308 21:59:16.982190 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-08T21:59:16.982310230Z E0308 21:59:16.982267 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-08T21:59:21.240741532Z E0308 21:59:21.240660 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-08T21:59:24.665689829Z I0308 21:59:24.665499 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T21:59:24.665689829Z E0308 21:59:24.665653 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-08T21:59:51.949478189Z W0308 21:59:51.949354 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-08T21:59:51.949478189Z E0308 21:59:51.949413 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-08T21:59:54.680058615Z I0308 21:59:54.679888 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T21:59:54.680058615Z E0308 21:59:54.680044 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-08T22:00:21.243185512Z E0308 22:00:21.243059 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-policy-controller-lock) 2026-03-08T22:00:24.694533373Z I0308 22:00:24.694327 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T22:00:24.694533373Z E0308 22:00:24.694479 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-08T22:00:51.558838450Z W0308 22:00:51.558715 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-08T22:00:51.558838450Z E0308 22:00:51.558794 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-08T22:00:54.706295330Z I0308 22:00:54.706153 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T22:00:54.706354041Z E0308 22:00:54.706298 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-08T22:01:24.716281543Z I0308 22:01:24.716139 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T22:01:24.716281543Z E0308 22:01:24.716257 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-08T22:01:43.079529391Z W0308 22:01:43.079419 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-08T22:01:43.079568112Z E0308 22:01:43.079531 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-08T22:01:54.728434145Z I0308 22:01:54.728288 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T22:01:54.728434145Z E0308 22:01:54.728414 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-08T22:01:56.721285409Z I0308 22:01:56.721213 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-03-08T22:02:24.743971733Z I0308 22:02:24.743203 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T22:02:24.743971733Z E0308 22:02:24.743318 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-08T22:02:29.637323625Z W0308 22:02:29.637227 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-08T22:02:29.637323625Z E0308 22:02:29.637305 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-08T22:02:54.759414570Z I0308 22:02:54.759279 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-08T22:02:54.759484552Z E0308 22:02:54.759436 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000006571315153371026033607 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-08T22:02:05.181258361Z I0308 22:02:05.181161 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/Config, namespace: , name: cluster, uid: 392a6219-abbb-44d8-b01a-b720fbe3cd36]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50"}] 2026-03-08T22:02:05.184833372Z I0308 22:02:05.184616 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[helm.openshift.io/v1beta1/HelmChartRepository, namespace: , name: openshift-helm-charts, uid: cfcbbfa2-ec04-4436-aaa7-e0e7d88435a5]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50"}] 2026-03-08T22:02:05.190187861Z I0308 22:02:05.190114 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/OLM, namespace: , name: cluster, uid: b673fb20-3080-461e-968a-52cba943ce5f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50"}] 2026-03-08T22:02:05.193313621Z I0308 22:02:05.192319 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/APIServer, namespace: , name: cluster, uid: 932f748b-6dad-4c21-a668-afb22d83b09f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50"}] 2026-03-08T22:02:09.272052865Z I0308 22:02:09.271951 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="33.576627ms" 2026-03-08T22:02:09.272172218Z I0308 22:02:09.272155 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="93.112µs" 2026-03-08T22:02:09.804289968Z I0308 22:02:09.804195 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-84bf6db4f9" duration="46.532µs" 2026-03-08T22:02:11.310352084Z I0308 22:02:11.310209 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" need=1 creating=1 2026-03-08T22:02:11.328310368Z I0308 22:02:11.328196 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:11.332657200Z I0308 22:02:11.332594 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="22.622925ms" 2026-03-08T22:02:11.355581692Z I0308 22:02:11.355511 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="22.86705ms" 2026-03-08T22:02:11.421757833Z I0308 22:02:11.421675 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="65.80576ms" 2026-03-08T22:02:11.421988749Z I0308 22:02:11.421972 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="119.463µs" 2026-03-08T22:02:11.434922693Z I0308 22:02:11.434839 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="82.072µs" 2026-03-08T22:02:12.097846083Z I0308 22:02:12.095765 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="42.711µs" 2026-03-08T22:02:15.156731973Z I0308 22:02:15.156286 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="128.754µs" 2026-03-08T22:02:15.173049295Z I0308 22:02:15.172973 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="94.653µs" 2026-03-08T22:02:15.173300081Z I0308 22:02:15.173249 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="32.691µs" 2026-03-08T22:02:15.207122505Z I0308 22:02:15.202350 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="71.702µs" 2026-03-08T22:02:15.207122505Z I0308 22:02:15.202703 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="61.952µs" 2026-03-08T22:02:15.250124977Z I0308 22:02:15.249543 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="46.306727ms" 2026-03-08T22:02:15.251562654Z I0308 22:02:15.250532 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="101.082µs" 2026-03-08T22:02:15.251562654Z I0308 22:02:15.250625 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="35.321µs" 2026-03-08T22:02:15.287258917Z I0308 22:02:15.286336 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="87.852µs" 2026-03-08T22:02:15.338849459Z I0308 22:02:15.338786 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="48.791µs" 2026-03-08T22:02:15.376996815Z I0308 22:02:15.376921 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-84bf6db4f9" duration="13.816747ms" 2026-03-08T22:02:15.378170085Z I0308 22:02:15.378130 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-84bf6db4f9" duration="68.161µs" 2026-03-08T22:02:16.005457124Z I0308 22:02:16.005364 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="95.243µs" 2026-03-08T22:02:16.089029503Z I0308 22:02:16.088919 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="70.452µs" 2026-03-08T22:02:17.184794698Z I0308 22:02:17.184614 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" need=0 deleting=1 2026-03-08T22:02:17.184794698Z I0308 22:02:17.184661 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" relatedReplicaSets=["openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945"] 2026-03-08T22:02:17.184794698Z I0308 22:02:17.184705 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="cluster-cloud-controller-manager-operator-559568b945" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-kmbpx" 2026-03-08T22:02:17.214543636Z I0308 22:02:17.214427 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="29.842511ms" 2026-03-08T22:02:17.214885995Z I0308 22:02:17.214803 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:17.232884360Z I0308 22:02:17.232792 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="18.303183ms" 2026-03-08T22:02:17.252493447Z I0308 22:02:17.252417 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="23.941669ms" 2026-03-08T22:02:17.252542518Z I0308 22:02:17.252521 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="62.642µs" 2026-03-08T22:02:17.266115249Z I0308 22:02:17.265869 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="33.020314ms" 2026-03-08T22:02:17.266115249Z I0308 22:02:17.265982 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="60.932µs" 2026-03-08T22:02:18.337990416Z I0308 22:02:18.337901 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="43.941µs" 2026-03-08T22:02:19.251789698Z I0308 22:02:19.251634 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="77.442µs" 2026-03-08T22:02:19.325404551Z I0308 22:02:19.325214 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="15.89087ms" 2026-03-08T22:02:19.325462942Z I0308 22:02:19.325416 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="139.224µs" 2026-03-08T22:02:19.342435461Z I0308 22:02:19.341489 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="75.141µs" 2026-03-08T22:02:19.368195176Z I0308 22:02:19.367976 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="55.361µs" 2026-03-08T22:02:19.374897189Z I0308 22:02:19.374612 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="43.801µs" 2026-03-08T22:02:19.386416507Z I0308 22:02:19.386328 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" need=1 creating=1 2026-03-08T22:02:19.405512180Z I0308 22:02:19.405444 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="19.143295ms" 2026-03-08T22:02:19.405799718Z I0308 22:02:19.405765 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:19.452930076Z I0308 22:02:19.450808 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="45.30168ms" 2026-03-08T22:02:19.454733862Z I0308 22:02:19.454683 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:19.485999400Z I0308 22:02:19.485907 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:19.509868336Z I0308 22:02:19.509783 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="58.909402ms" 2026-03-08T22:02:19.510063592Z I0308 22:02:19.510043 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="85.213µs" 2026-03-08T22:02:19.574827666Z I0308 22:02:19.574739 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/prometheus-operator-5ff8674d55" need=1 creating=1 2026-03-08T22:02:19.594318579Z I0308 22:02:19.590609 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:19.599950975Z I0308 22:02:19.598977 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="24.286507ms" 2026-03-08T22:02:19.610033605Z I0308 22:02:19.609977 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="10.926222ms" 2026-03-08T22:02:19.610240410Z I0308 22:02:19.610222 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="114.893µs" 2026-03-08T22:02:19.617406345Z I0308 22:02:19.615234 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="45.871µs" 2026-03-08T22:02:19.636108189Z I0308 22:02:19.635194 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="47.041µs" 2026-03-08T22:02:20.340232762Z I0308 22:02:20.340173 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="49.442µs" 2026-03-08T22:02:21.290724033Z I0308 22:02:21.290642 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="13.57236ms" 2026-03-08T22:02:21.290789204Z I0308 22:02:21.290760 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="78.162µs" 2026-03-08T22:02:23.312757740Z I0308 22:02:23.312666 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="15.48328ms" 2026-03-08T22:02:23.312826663Z I0308 22:02:23.312765 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="47.882µs" 2026-03-08T22:02:24.974137920Z I0308 22:02:24.971030 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/openshift-state-metrics-74cc79fd76" need=1 creating=1 2026-03-08T22:02:25.003036047Z I0308 22:02:25.002936 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="31.919705ms" 2026-03-08T22:02:25.005677506Z I0308 22:02:25.005620 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/openshift-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"openshift-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:25.027536930Z I0308 22:02:25.025115 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="22.09713ms" 2026-03-08T22:02:25.027536930Z I0308 22:02:25.025194 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="38.502µs" 2026-03-08T22:02:25.036644926Z I0308 22:02:25.036551 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/kube-state-metrics-68b88f8cb5" need=1 creating=1 2026-03-08T22:02:25.054483016Z I0308 22:02:25.051865 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="70.033µs" 2026-03-08T22:02:25.079114523Z I0308 22:02:25.075185 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/kube-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"kube-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:25.101043360Z I0308 22:02:25.095216 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="58.707117ms" 2026-03-08T22:02:25.141189397Z I0308 22:02:25.138876 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/kube-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"kube-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:25.212774166Z I0308 22:02:25.212695 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="117.215208ms" 2026-03-08T22:02:25.212833289Z I0308 22:02:25.212805 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="69.963µs" 2026-03-08T22:02:25.213058474Z I0308 22:02:25.213023 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="124.343µs" 2026-03-08T22:02:25.756684021Z I0308 22:02:25.756597 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="82.032µs" 2026-03-08T22:02:26.099315115Z I0308 22:02:26.099234 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="69.271µs" 2026-03-08T22:02:28.362464623Z I0308 22:02:28.362272 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="11.354593ms" 2026-03-08T22:02:28.362464623Z I0308 22:02:28.362448 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-74cc79fd76" duration="110.893µs" 2026-03-08T22:02:28.390141109Z I0308 22:02:28.389816 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="12.259357ms" 2026-03-08T22:02:28.390470067Z I0308 22:02:28.390407 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-68b88f8cb5" duration="73.612µs" 2026-03-08T22:02:30.501599358Z I0308 22:02:30.501456 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/metrics-server-f5876b8d7" need=1 creating=1 2026-03-08T22:02:30.527168688Z I0308 22:02:30.526730 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/metrics-server" err="Operation cannot be fulfilled on deployments.apps \"metrics-server\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-08T22:02:30.530198266Z I0308 22:02:30.530125 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-f5876b8d7" duration="28.835754ms" 2026-03-08T22:02:30.550932422Z I0308 22:02:30.550840 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-f5876b8d7" duration="20.649393ms" 2026-03-08T22:02:30.551041195Z I0308 22:02:30.551006 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-f5876b8d7" duration="109.163µs" 2026-03-08T22:02:30.569530362Z I0308 22:02:30.569449 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-f5876b8d7" duration="106.363µs" 2026-03-08T22:02:30.615000878Z I0308 22:02:30.614929 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-f5876b8d7" duration="86.482µs" 2026-03-08T22:02:31.376347481Z I0308 22:02:31.376101 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-f5876b8d7" duration="85.952µs" 2026-03-08T22:02:31.679928505Z E0308 22:02:31.679748 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-03-08T22:02:31.691361291Z I0308 22:02:31.689302 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-03-08T22:02:33.406574611Z I0308 22:02:33.406221 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-f5876b8d7" duration="75.002µs" 2026-03-08T22:02:44.499156799Z I0308 22:02:44.498703 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="15.697025ms" 2026-03-08T22:02:44.499156799Z I0308 22:02:44.498876 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="104.913µs" 2026-03-08T22:02:45.507979897Z I0308 22:02:45.507896 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="14.190518ms" 2026-03-08T22:02:45.508094650Z I0308 22:02:45.508047 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="86.562µs" kube-controller-manager_previous.log0000640000000000000000000003173215153371026033773 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-08T22:00:08.194902469Z I0308 22:00:08.194888 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-03-08T22:00:08.194902469Z I0308 22:00:08.194893 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-03-08T22:00:08.194902469Z I0308 22:00:08.194896 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-03-08T22:00:08.194910749Z I0308 22:00:08.194901 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-03-08T22:00:08.194910749Z I0308 22:00:08.194906 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-03-08T22:00:08.194918309Z I0308 22:00:08.194911 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-03-08T22:00:08.194918309Z I0308 22:00:08.194914 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-03-08T22:00:08.194925819Z I0308 22:00:08.194919 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-03-08T22:00:08.194925819Z I0308 22:00:08.194922 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-03-08T22:00:08.194933350Z I0308 22:00:08.194925 1 flags.go:64] FLAG: --secure-port="10257" 2026-03-08T22:00:08.194933350Z I0308 22:00:08.194929 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-03-08T22:00:08.194940780Z I0308 22:00:08.194933 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-03-08T22:00:08.194940780Z I0308 22:00:08.194936 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-03-08T22:00:08.194948020Z I0308 22:00:08.194939 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-03-08T22:00:08.194948020Z I0308 22:00:08.194943 1 flags.go:64] FLAG: --tls-cert-file="" 2026-03-08T22:00:08.194955470Z I0308 22:00:08.194946 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-03-08T22:00:08.194955470Z I0308 22:00:08.194951 1 flags.go:64] FLAG: --tls-min-version="" 2026-03-08T22:00:08.194962910Z I0308 22:00:08.194954 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-03-08T22:00:08.194962910Z I0308 22:00:08.194957 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-03-08T22:00:08.194970531Z I0308 22:00:08.194962 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-03-08T22:00:08.194970531Z I0308 22:00:08.194966 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-03-08T22:00:08.194978371Z I0308 22:00:08.194968 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-03-08T22:00:08.194978371Z I0308 22:00:08.194972 1 flags.go:64] FLAG: --v="2" 2026-03-08T22:00:08.194985651Z I0308 22:00:08.194978 1 flags.go:64] FLAG: --version="false" 2026-03-08T22:00:08.194992681Z I0308 22:00:08.194983 1 flags.go:64] FLAG: --vmodule="" 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195182 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195192 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195195 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195200 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195203 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195206 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195209 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195211 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195214 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195217 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195219 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195222 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195224 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195228 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195231 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195234 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195237 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195239 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195242 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195245 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195248 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195251 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195254 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195257 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195260 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195263 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195265 1 feature_gate.go:330] unrecognized feature gate: Example 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195268 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195272 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195274 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195277 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195280 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195283 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195287 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195290 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195293 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195296 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195299 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195302 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195305 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195308 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195312 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195315 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195318 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195320 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195323 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195326 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195328 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195331 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195333 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195336 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195339 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195341 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195344 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195346 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195349 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195352 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195356 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195358 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195362 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195366 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195369 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195372 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195374 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195377 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195380 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195382 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195385 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195388 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195391 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195393 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-03-08T22:00:08.195431892Z W0308 22:00:08.195395 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-03-08T22:00:08.457467243Z I0308 22:00:08.457337 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-03-08T22:00:08.460539982Z I0308 22:00:08.460440 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2026-03-08T22:01:08.749697986Z E0308 22:01:08.749550 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps extension-apiserver-authentication)" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002734715153371026024632 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"57553c71-144e-4ae1-a2d0-cb81a829e595","resourceVersion":"9657","creationTimestamp":"2026-03-08T21:57:09Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.mirror":"f78c05e1499b533b83f091333d61f045","kubernetes.io/config.seen":"2026-03-08T21:55:33.028617685Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"0ddb8058-8075-483a-b934-fc2452244c0b","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:49Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:49Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T21:57:30Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-03-08T21:55:46Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","containerID":"cri-o://fb0495eb908674ff43dd829011c8a9c25cb94f391266361a6fd4682f944d4674","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-03-08T22:01:39Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-08T22:00:08Z","finishedAt":"2026-03-08T22:01:08Z","containerID":"cri-o://1daa71553c686e610a1691e8e414cf629eaef6dfe3713445234ba8f4abd369b4"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://fb45ca0ddc44058990168eeda3f6ed62790667fe93e6e2fe4d4fe2bd256830e4","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415153371026044460 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-8pqc22026-03-08T22:00:42.529035944Z I0308 22:00:42.528820 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-08T22:00:42.529035944Z I0308 22:00:42.528955 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T22:00:42.529597039Z I0308 22:00:42.529533 1 observer_polling.go:159] Starting file observer 2026-03-08T22:01:39.302237669Z I0308 22:01:39.302150 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602162248.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-08T22:01:39.649250005Z I0308 22:01:39.648497 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-08T22:01:39.649250005Z I0308 22:01:39.648829 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-03-08T22:01:39.653252009Z I0308 22:01:39.653205 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T22:01:39.653252009Z W0308 22:01:39.653233 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:39.653252009Z W0308 22:01:39.653239 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:39.653252009Z W0308 22:01:39.653244 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T22:01:39.653252009Z W0308 22:01:39.653248 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T22:01:39.653272749Z W0308 22:01:39.653251 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T22:01:39.653272749Z W0308 22:01:39.653255 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T22:01:39.669339845Z I0308 22:01:39.669247 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-08T22:01:39.672662020Z I0308 22:01:39.672484 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T22:01:39.672662020Z I0308 22:01:39.672524 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T22:01:39.672662020Z I0308 22:01:39.672564 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T22:01:39.672860945Z I0308 22:01:39.672703 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T22:01:39.672860945Z I0308 22:01:39.672720 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:01:39.672860945Z I0308 22:01:39.672739 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T22:01:39.672860945Z I0308 22:01:39.672759 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T22:01:39.672860945Z I0308 22:01:39.672825 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:39.774690297Z I0308 22:01:39.772990 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T22:01:39.774690297Z I0308 22:01:39.773690 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:01:39.774690297Z I0308 22:01:39.773761 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000004231415153371026044661 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-8pqc22026-03-08T21:58:52.000022564Z I0308 21:58:51.998155 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.001171 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.001195 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.001947 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002001 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.001995 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002030 1 base_controller.go:181] Shutting down PruneController ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002018 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002051 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002067 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002126 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002135 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002152 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002210 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002224 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002237 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002245 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002260 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002270 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002279 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002289 1 controller_manager.go:54] RevisionController controller terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002301 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002309 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002316 1 controller_manager.go:54] PruneController controller terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002329 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002338 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002345 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002363 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002372 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002388 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-08T21:58:52.003182924Z I0308 21:58:52.002396 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003450 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003518 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003543 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003557 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003582 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003597 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003620 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003638 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003665 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1398682924/tls.crt::/tmp/serving-cert-1398682924/tls.key" 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003681 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003707 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003727 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003735 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003745 1 base_controller.go:181] Shutting down Installer ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003754 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003591 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003761 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003775 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003777 1 builder.go:335] server exited 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003788 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003799 1 base_controller.go:181] Shutting down GuardController ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003804 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003808 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003815 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003793 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003814 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003831 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003824 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003840 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003848 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003851 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003855 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003832 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003862 1 controller_manager.go:54] GuardController controller terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003872 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.003882 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-08T21:58:52.006242682Z E0308 21:58:52.003972 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-08T21:58:52.006242682Z I0308 21:58:52.004176 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"ca4a5a0e-ee41-4bd1-9cf7-86101a2abdb5", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 2 count 0 on node "master-0": Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0": context canceled 2026-03-08T21:58:52.006242682Z I0308 21:58:52.005302 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-08T21:58:52.006242682Z I0308 21:58:52.005337 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-08T21:58:52.006242682Z I0308 21:58:52.005347 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-08T21:58:52.006242682Z E0308 21:58:52.005349 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:52.006242682Z W0308 21:58:52.005422 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-08T21:58:52.006242682Z W0308 21:58:52.005434 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-08T21:58:52.006242682Z W0308 21:58:52.005439 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-08T21:58:52.006242682Z E0308 21:58:52.005535 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:52.006242682Z E0308 21:58:52.005564 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:52.006242682Z E0308 21:58:52.005753 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/recycler-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-infra/serviceaccounts/pv-recycler-controller\": context canceled, \"assets/kube-controller-manager/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:58:52.006577121Z I0308 21:58:52.006504 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-03-08T21:58:52.006577121Z I0308 21:58:52.006527 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-03-08T21:58:52.006577121Z I0308 21:58:52.006535 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-03-08T21:58:52.007065763Z E0308 21:58:52.006999 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:58:52.007065763Z I0308 21:58:52.007058 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-08T21:58:52.007117094Z I0308 21:58:52.007103 1 base_controller.go:113] All Installer workers have been terminated 2026-03-08T21:58:52.007139674Z I0308 21:58:52.007130 1 controller_manager.go:54] Installer controller terminated 2026-03-08T21:58:52.007182446Z I0308 21:58:52.007152 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-08T21:58:52.007182446Z I0308 21:58:52.007171 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-08T21:58:52.007256807Z I0308 21:58:52.007200 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-08T21:58:52.007256807Z I0308 21:58:52.007244 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-08T21:58:52.007842573Z E0308 21:58:52.007759 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:52.009470594Z I0308 21:58:52.009409 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-03-08T21:58:52.009470594Z I0308 21:58:52.009453 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-03-08T21:58:52.009554896Z I0308 21:58:52.009494 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-08T21:58:52.009619277Z I0308 21:58:52.009568 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-08T21:58:52.009619277Z I0308 21:58:52.009605 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-08T21:58:56.997327610Z I0308 21:58:56.997244 1 observer_polling.go:162] Shutting down file observer 2026-03-08T21:59:26.003254481Z E0308 21:59:26.003129 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T21:59:26.003254481Z W0308 21:59:26.003188 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-86d7cdfdfb-8pqc2.json0000640000000000000000000001451015153371026033576 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-86d7cdfdfb-8pqc2","generateName":"kube-controller-manager-operator-86d7cdfdfb-","namespace":"openshift-kube-controller-manager-operator","uid":"b849f992-1020-4633-98be-75705b962fa9","resourceVersion":"9420","creationTimestamp":"2026-03-08T21:56:07Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"86d7cdfdfb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-86d7cdfdfb","uid":"56df493f-d2cf-48f8-8a05-369c7bc74055","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:35768a0c3eb24134dd38633e8acfc7db69ee96b2fd660e9bba3b8c996452fef7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-03-08T21:57:18Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-08T22:00:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T21:57:31Z","finishedAt":"2026-03-08T21:59:26Z","containerID":"cri-o://c086cbd7303ffe955bb2645d06594a1046769c847ec0d61ce7c507a7b2e3ee42"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://8a52489302a5dc96ab51b546dab29cb1d4fff7df453456bacfb9302f4b296bd5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000001620715153371026031004 0ustar00000000000000002026-03-08T21:58:29.398930819Z I0308 21:58:29.398681 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000510000 cert-dir:0xc000510500 cert-secrets:0xc0000e3e00 configmaps:0xc0000e3540 namespace:0xc0000e3180 optional-cert-configmaps:0xc000510280 optional-configmaps:0xc0000e37c0 optional-secrets:0xc0000e3680 pod:0xc0000e32c0 pod-manifest-dir:0xc0000e3a40 resource-dir:0xc0000e3900 revision:0xc0000e3040 secrets:0xc0000e3400 v:0xc0002c2000] [0xc0002c2000 0xc0000e3040 0xc0000e3180 0xc0000e32c0 0xc0000e3900 0xc0000e3a40 0xc0000e3540 0xc0000e37c0 0xc0000e3400 0xc0000e3680 0xc000510500 0xc000510000 0xc000510280 0xc0000e3e00] [] map[cert-configmaps:0xc000510000 cert-dir:0xc000510500 cert-secrets:0xc0000e3e00 configmaps:0xc0000e3540 help:0xc0002c2780 kubeconfig:0xc0000e2f00 log-flush-frequency:0xc000511ea0 namespace:0xc0000e3180 optional-cert-configmaps:0xc000510280 optional-cert-secrets:0xc000510140 optional-configmaps:0xc0000e37c0 optional-secrets:0xc0000e3680 pod:0xc0000e32c0 pod-manifest-dir:0xc0000e3a40 pod-manifests-lock-file:0xc0000e3cc0 resource-dir:0xc0000e3900 revision:0xc0000e3040 secrets:0xc0000e3400 timeout-duration:0xc0000e3b80 v:0xc0002c2000 vmodule:0xc0002c2140] [0xc0000e2f00 0xc0000e3040 0xc0000e3180 0xc0000e32c0 0xc0000e3400 0xc0000e3540 0xc0000e3680 0xc0000e37c0 0xc0000e3900 0xc0000e3a40 0xc0000e3b80 0xc0000e3cc0 0xc0000e3e00 0xc000510000 0xc000510140 0xc000510280 0xc000510500 0xc000511ea0 0xc0002c2000 0xc0002c2140 0xc0002c2780] [0xc000510000 0xc000510500 0xc0000e3e00 0xc0000e3540 0xc0002c2780 0xc0000e2f00 0xc000511ea0 0xc0000e3180 0xc000510280 0xc000510140 0xc0000e37c0 0xc0000e3680 0xc0000e32c0 0xc0000e3a40 0xc0000e3cc0 0xc0000e3900 0xc0000e3040 0xc0000e3400 0xc0000e3b80 0xc0002c2000 0xc0002c2140] map[104:0xc0002c2780 118:0xc0002c2000] [] -1 0 0xc00066cb10 true 0x77b900 []} 2026-03-08T21:58:29.399101823Z I0308 21:58:29.398984 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000604680)({ 2026-03-08T21:58:29.399101823Z KubeConfig: (string) "", 2026-03-08T21:58:29.399101823Z KubeClient: (kubernetes.Interface) , 2026-03-08T21:58:29.399101823Z Revision: (string) (len=1) "2", 2026-03-08T21:58:29.399101823Z NodeName: (string) "", 2026-03-08T21:58:29.399101823Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-03-08T21:58:29.399101823Z Clock: (clock.RealClock) { 2026-03-08T21:58:29.399101823Z }, 2026-03-08T21:58:29.399101823Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-03-08T21:58:29.399101823Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-08T21:58:29.399101823Z (string) (len=27) "service-account-private-key", 2026-03-08T21:58:29.399101823Z (string) (len=31) "localhost-recovery-client-token" 2026-03-08T21:58:29.399101823Z }, 2026-03-08T21:58:29.399101823Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T21:58:29.399101823Z (string) (len=12) "serving-cert" 2026-03-08T21:58:29.399101823Z }, 2026-03-08T21:58:29.399101823Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-08T21:58:29.399101823Z (string) (len=27) "kube-controller-manager-pod", 2026-03-08T21:58:29.399101823Z (string) (len=6) "config", 2026-03-08T21:58:29.399101823Z (string) (len=32) "cluster-policy-controller-config", 2026-03-08T21:58:29.399101823Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-08T21:58:29.399101823Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-08T21:58:29.399101823Z (string) (len=17) "serviceaccount-ca", 2026-03-08T21:58:29.399101823Z (string) (len=10) "service-ca", 2026-03-08T21:58:29.399101823Z (string) (len=15) "recycler-config" 2026-03-08T21:58:29.399101823Z }, 2026-03-08T21:58:29.399101823Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T21:58:29.399101823Z (string) (len=12) "cloud-config" 2026-03-08T21:58:29.399101823Z }, 2026-03-08T21:58:29.399101823Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-08T21:58:29.399101823Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-08T21:58:29.399101823Z (string) (len=10) "csr-signer" 2026-03-08T21:58:29.399101823Z }, 2026-03-08T21:58:29.399101823Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-08T21:58:29.399101823Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-08T21:58:29.399101823Z (string) (len=20) "aggregator-client-ca", 2026-03-08T21:58:29.399101823Z (string) (len=9) "client-ca" 2026-03-08T21:58:29.399101823Z }, 2026-03-08T21:58:29.399101823Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T21:58:29.399101823Z (string) (len=17) "trusted-ca-bundle" 2026-03-08T21:58:29.399101823Z }, 2026-03-08T21:58:29.399101823Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-08T21:58:29.399101823Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-08T21:58:29.399101823Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-08T21:58:29.399101823Z Timeout: (time.Duration) 2m0s, 2026-03-08T21:58:29.399101823Z StaticPodManifestsLockFile: (string) "", 2026-03-08T21:58:29.399101823Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-08T21:58:29.399101823Z KubeletVersion: (string) "" 2026-03-08T21:58:29.399101823Z }) 2026-03-08T21:58:29.399918275Z I0308 21:58:29.399878 1 cmd.go:413] Getting controller reference for node master-0 2026-03-08T21:59:25.725163675Z W0308 21:59:25.724898 1 cmd.go:423] unable to get owner reference (falling back to namespace): Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T21:59:25.725163675Z I0308 21:59:25.725006 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-08T21:59:25.725163675Z I0308 21:59:25.725140 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T21:59:25.725272058Z I0308 21:59:25.725160 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T21:59:39.726535342Z W0308 21:59:39.726391 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:03.729114574Z W0308 22:00:03.728934 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:23.731750504Z W0308 22:00:23.731646 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-08T22:00:29.401317172Z F0308 22:00:29.401151 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-controller-manager/installer-2-master-0.json0000640000000000000000000001717715153371026024500 0ustar0000000000000000{"metadata":{"name":"installer-2-master-0","namespace":"openshift-kube-controller-manager","uid":"78dc543f-66ed-4098-b5a9-699ec2ccc856","resourceVersion":"9421","creationTimestamp":"2026-03-08T21:58:27Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.59/23\"],\"mac_address\":\"0a:58:0a:80:00:3b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.59/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.59\"\n ],\n \"mac\": \"0a:58:0a:80:00:3b\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-2","uid":"afabf3be-0028-41e9-aaff-64e8813629ba"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=2","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-v7cvh"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:00:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:27Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:00:41Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:00:41Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:27Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.59","podIPs":[{"ip":"10.128.0.59"}],"startTime":"2026-03-08T21:58:27Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"en=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0308 21:58:29.399878 1 cmd.go:413] Getting controller reference for node master-0\nW0308 21:59:25.724898 1 cmd.go:423] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0308 21:59:25.725006 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0308 21:59:25.725140 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0308 21:59:25.725160 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nW0308 21:59:39.726391 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0308 22:00:03.728934 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0308 22:00:23.731646 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0308 22:00:29.401151 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-08T21:58:28Z","finishedAt":"2026-03-08T22:00:29Z","containerID":"cri-o://b72861ea5791b8527c79a3ba9ca252aad4949d7fe333b8f4afa8d681aa68f9d1"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://b72861ea5791b8527c79a3ba9ca252aad4949d7fe333b8f4afa8d681aa68f9d1","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715153371026027206 0ustar00000000000000002026-03-08T21:58:22.252143381Z I0308 21:58:22.251790 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000a22000 cert-dir:0xc000a221e0 cert-secrets:0xc0009f9ea0 configmaps:0xc0009f9a40 namespace:0xc0009f9860 optional-cert-configmaps:0xc000a22140 optional-cert-secrets:0xc000a220a0 optional-configmaps:0xc0009f9b80 optional-secrets:0xc0009f9ae0 pod:0xc0009f9900 pod-manifest-dir:0xc0009f9cc0 resource-dir:0xc0009f9c20 revision:0xc0009f97c0 secrets:0xc0009f99a0 v:0xc000a235e0] [0xc000a235e0 0xc0009f97c0 0xc0009f9860 0xc0009f9900 0xc0009f9c20 0xc0009f9cc0 0xc0009f9a40 0xc0009f9b80 0xc0009f99a0 0xc0009f9ae0 0xc000a221e0 0xc000a22000 0xc000a22140 0xc0009f9ea0 0xc000a220a0] [] map[cert-configmaps:0xc000a22000 cert-dir:0xc000a221e0 cert-secrets:0xc0009f9ea0 configmaps:0xc0009f9a40 help:0xc000a239a0 kubeconfig:0xc0009f9720 log-flush-frequency:0xc000a23540 namespace:0xc0009f9860 optional-cert-configmaps:0xc000a22140 optional-cert-secrets:0xc000a220a0 optional-configmaps:0xc0009f9b80 optional-secrets:0xc0009f9ae0 pod:0xc0009f9900 pod-manifest-dir:0xc0009f9cc0 pod-manifests-lock-file:0xc0009f9e00 resource-dir:0xc0009f9c20 revision:0xc0009f97c0 secrets:0xc0009f99a0 timeout-duration:0xc0009f9d60 v:0xc000a235e0 vmodule:0xc000a23680] [0xc0009f9720 0xc0009f97c0 0xc0009f9860 0xc0009f9900 0xc0009f99a0 0xc0009f9a40 0xc0009f9ae0 0xc0009f9b80 0xc0009f9c20 0xc0009f9cc0 0xc0009f9d60 0xc0009f9e00 0xc0009f9ea0 0xc000a22000 0xc000a220a0 0xc000a22140 0xc000a221e0 0xc000a23540 0xc000a235e0 0xc000a23680 0xc000a239a0] [0xc000a22000 0xc000a221e0 0xc0009f9ea0 0xc0009f9a40 0xc000a239a0 0xc0009f9720 0xc000a23540 0xc0009f9860 0xc000a22140 0xc000a220a0 0xc0009f9b80 0xc0009f9ae0 0xc0009f9900 0xc0009f9cc0 0xc0009f9e00 0xc0009f9c20 0xc0009f97c0 0xc0009f99a0 0xc0009f9d60 0xc000a235e0 0xc000a23680] map[104:0xc000a239a0 118:0xc000a235e0] [] -1 0 0xc0009fe4e0 true 0xae2020 []} 2026-03-08T21:58:22.252302655Z I0308 21:58:22.252220 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000310680)({ 2026-03-08T21:58:22.252302655Z KubeConfig: (string) "", 2026-03-08T21:58:22.252302655Z KubeClient: (kubernetes.Interface) , 2026-03-08T21:58:22.252302655Z Revision: (string) (len=1) "1", 2026-03-08T21:58:22.252302655Z NodeName: (string) "", 2026-03-08T21:58:22.252302655Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-08T21:58:22.252302655Z Clock: (clock.RealClock) { 2026-03-08T21:58:22.252302655Z }, 2026-03-08T21:58:22.252302655Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-08T21:58:22.252302655Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-08T21:58:22.252302655Z (string) (len=11) "etcd-client", 2026-03-08T21:58:22.252302655Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-08T21:58:22.252302655Z (string) (len=31) "localhost-recovery-client-token" 2026-03-08T21:58:22.252302655Z }, 2026-03-08T21:58:22.252302655Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-08T21:58:22.252302655Z (string) (len=17) "encryption-config", 2026-03-08T21:58:22.252302655Z (string) (len=21) "webhook-authenticator" 2026-03-08T21:58:22.252302655Z }, 2026-03-08T21:58:22.252302655Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-08T21:58:22.252302655Z (string) (len=18) "kube-apiserver-pod", 2026-03-08T21:58:22.252302655Z (string) (len=6) "config", 2026-03-08T21:58:22.252302655Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-08T21:58:22.252302655Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-08T21:58:22.252302655Z (string) (len=15) "etcd-serving-ca", 2026-03-08T21:58:22.252302655Z (string) (len=18) "kubelet-serving-ca", 2026-03-08T21:58:22.252302655Z (string) (len=22) "sa-token-signing-certs", 2026-03-08T21:58:22.252302655Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-08T21:58:22.252302655Z }, 2026-03-08T21:58:22.252302655Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-08T21:58:22.252302655Z (string) (len=14) "oauth-metadata", 2026-03-08T21:58:22.252302655Z (string) (len=12) "cloud-config", 2026-03-08T21:58:22.252302655Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-08T21:58:22.252302655Z }, 2026-03-08T21:58:22.252302655Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-08T21:58:22.252302655Z (string) (len=17) "aggregator-client", 2026-03-08T21:58:22.252302655Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-08T21:58:22.252302655Z (string) (len=31) "service-network-serving-certkey", 2026-03-08T21:58:22.252302655Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-08T21:58:22.252302655Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-08T21:58:22.252302655Z (string) (len=33) "bound-service-account-signing-key", 2026-03-08T21:58:22.252302655Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-08T21:58:22.252302655Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-08T21:58:22.252302655Z (string) (len=14) "kubelet-client", 2026-03-08T21:58:22.252302655Z (string) (len=16) "node-kubeconfigs" 2026-03-08T21:58:22.252302655Z }, 2026-03-08T21:58:22.252302655Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-08T21:58:22.252302655Z (string) (len=17) "user-serving-cert", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-000", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-001", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-002", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-003", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-004", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-005", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-006", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-007", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-008", 2026-03-08T21:58:22.252302655Z (string) (len=21) "user-serving-cert-009" 2026-03-08T21:58:22.252302655Z }, 2026-03-08T21:58:22.252302655Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-08T21:58:22.252302655Z (string) (len=20) "aggregator-client-ca", 2026-03-08T21:58:22.252302655Z (string) (len=9) "client-ca", 2026-03-08T21:58:22.252302655Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-08T21:58:22.252302655Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-08T21:58:22.252302655Z }, 2026-03-08T21:58:22.252302655Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-08T21:58:22.252302655Z (string) (len=17) "trusted-ca-bundle" 2026-03-08T21:58:22.252302655Z }, 2026-03-08T21:58:22.252302655Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-08T21:58:22.252302655Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-08T21:58:22.252302655Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-08T21:58:22.252302655Z Timeout: (time.Duration) 2m0s, 2026-03-08T21:58:22.252302655Z StaticPodManifestsLockFile: (string) "", 2026-03-08T21:58:22.252302655Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-08T21:58:22.252302655Z KubeletVersion: (string) "" 2026-03-08T21:58:22.252302655Z }) 2026-03-08T21:58:22.256784912Z I0308 21:58:22.256708 1 cmd.go:413] Getting controller reference for node master-0 2026-03-08T21:58:22.299675197Z I0308 21:58:22.297133 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-08T21:58:22.299675197Z I0308 21:58:22.297206 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T21:58:22.299675197Z I0308 21:58:22.297221 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T21:58:22.303414353Z I0308 21:58:22.303357 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-08T21:58:52.303653207Z I0308 21:58:52.303532 1 cmd.go:524] Getting installer pods for node master-0 2026-03-08T21:59:06.307967740Z F0308 21:59:06.307823 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115153371026022666 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"147f99a4-5e8d-4d76-9c13-3ec3ef6d04a0","resourceVersion":"9450","creationTimestamp":"2026-03-08T21:58:15Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.50/23\"],\"mac_address\":\"0a:58:0a:80:00:32\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.50/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.50\"\n ],\n \"mac\": \"0a:58:0a:80:00:32\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"2e11a595-f512-47cf-b562-12d3c0eed01d"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:00:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:15Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:00:07Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:00:07Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:15Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.50","podIPs":[{"ip":"10.128.0.50"}],"startTime":"2026-03-08T21:58:15Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0308 21:58:22.256708 1 cmd.go:413] Getting controller reference for node master-0\nI0308 21:58:22.297133 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0308 21:58:22.297206 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0308 21:58:22.297221 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0308 21:58:22.303357 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0308 21:58:52.303532 1 cmd.go:524] Getting installer pods for node master-0\nF0308 21:59:06.307823 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-08T21:58:21Z","finishedAt":"2026-03-08T21:59:06Z","containerID":"cri-o://23ca4cac0c50a9d156ec6ed1b11f780e700b2306444f16b3646285a8a0f6b21b"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://23ca4cac0c50a9d156ec6ed1b11f780e700b2306444f16b3646285a8a0f6b21b","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615153371026035766 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-08T21:55:46.811365465Z I0308 21:55:46.810965 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010667415153371026032674 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-08T22:02:50.432249739Z I0308 22:02:50.432158 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:50.524023889Z I0308 22:02:50.523958 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:50.580098208Z I0308 22:02:50.580040 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:50.632363249Z I0308 22:02:50.632313 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:50.723949396Z I0308 22:02:50.723873 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:50.779945193Z I0308 22:02:50.779882 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:50.832681856Z I0308 22:02:50.832606 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:50.923674837Z I0308 22:02:50.923570 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:50.980378952Z I0308 22:02:50.980312 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.033259678Z I0308 22:02:51.033185 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.123857240Z I0308 22:02:51.123760 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.181914879Z I0308 22:02:51.179853 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.232782873Z I0308 22:02:51.232688 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.323234061Z I0308 22:02:51.323150 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.380298766Z I0308 22:02:51.380205 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.432015192Z I0308 22:02:51.431916 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.523532117Z I0308 22:02:51.523460 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.581028452Z I0308 22:02:51.580902 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.632412190Z I0308 22:02:51.632325 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.724324735Z I0308 22:02:51.724193 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.779926582Z I0308 22:02:51.779815 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.832529171Z I0308 22:02:51.832433 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.923497352Z I0308 22:02:51.923386 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:51.980015162Z I0308 22:02:51.979917 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.034471649Z I0308 22:02:52.034390 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.124195538Z I0308 22:02:52.124110 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.180563004Z I0308 22:02:52.180500 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.186904628Z E0308 22:02:52.186827 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-03-08T22:02:52.232122416Z I0308 22:02:52.232047 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.324168675Z I0308 22:02:52.324044 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.380714396Z I0308 22:02:52.380602 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.432379871Z I0308 22:02:52.432299 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.524366118Z I0308 22:02:52.524284 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.580297333Z I0308 22:02:52.580204 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.632797159Z I0308 22:02:52.632709 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.723739829Z I0308 22:02:52.723623 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.780316362Z I0308 22:02:52.780262 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.831902814Z I0308 22:02:52.831785 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.923766428Z I0308 22:02:52.923620 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:52.980198856Z I0308 22:02:52.980126 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.032116798Z I0308 22:02:53.031991 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.124211358Z I0308 22:02:53.124139 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.180504262Z I0308 22:02:53.180401 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.232520557Z I0308 22:02:53.232425 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.324611666Z I0308 22:02:53.324503 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.379989057Z I0308 22:02:53.379903 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.431964480Z I0308 22:02:53.431867 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.525712292Z I0308 22:02:53.525615 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.530180528Z E0308 22:02:53.530125 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-03-08T22:02:53.572533962Z E0308 22:02:53.572416 1 remote_available_controller.go:470] "Unhandled Error" err="v1.image.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/image.openshift.io/v1: 401" logger="UnhandledError" 2026-03-08T22:02:53.580953189Z I0308 22:02:53.580806 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.609189040Z E0308 22:02:53.604640 1 remote_available_controller.go:470] "Unhandled Error" err="v1.project.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/project.openshift.io/v1: 401" logger="UnhandledError" 2026-03-08T22:02:53.632728527Z I0308 22:02:53.632651 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.723805221Z I0308 22:02:53.723698 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.780996729Z I0308 22:02:53.780887 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.831701639Z I0308 22:02:53.831606 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.900325842Z E0308 22:02:53.900228 1 remote_available_controller.go:470] "Unhandled Error" err="v1.quota.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/quota.openshift.io/v1: 401" logger="UnhandledError" 2026-03-08T22:02:53.924501147Z I0308 22:02:53.924403 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:53.980124894Z I0308 22:02:53.980025 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.031542392Z I0308 22:02:54.031444 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.123859298Z I0308 22:02:54.123714 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.180834470Z I0308 22:02:54.180694 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.232592118Z I0308 22:02:54.232485 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.324467971Z I0308 22:02:54.324319 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.380016457Z I0308 22:02:54.379897 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.432647757Z I0308 22:02:54.432539 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.523487175Z I0308 22:02:54.523357 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.580575429Z I0308 22:02:54.580448 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.632747528Z I0308 22:02:54.632639 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.678156571Z E0308 22:02:54.678009 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.68:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.68:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-08T22:02:54.725318230Z I0308 22:02:54.724144 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.776905003Z E0308 22:02:54.776761 1 remote_available_controller.go:470] "Unhandled Error" err="v1.build.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/build.openshift.io/v1: 401" logger="UnhandledError" 2026-03-08T22:02:54.782485567Z I0308 22:02:54.781056 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.831820422Z I0308 22:02:54.831700 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.915609767Z E0308 22:02:54.915436 1 remote_available_controller.go:470] "Unhandled Error" err="v1.route.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401" logger="UnhandledError" 2026-03-08T22:02:54.924140767Z I0308 22:02:54.924024 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:54.980430832Z I0308 22:02:54.980286 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.032408365Z I0308 22:02:55.032295 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.124151876Z I0308 22:02:55.124008 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.180143623Z I0308 22:02:55.179982 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.230970716Z I0308 22:02:55.230775 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=1 seatDemandAvg=0.007528826295487992 seatDemandStdev=0.086441558697772 seatDemandSmoothed=10.173845257107278 fairFrac=2.331974373907979 currentCL=1 concurrencyDenominator=1 backstop=false 2026-03-08T22:02:55.232536666Z I0308 22:02:55.232457 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.323743273Z I0308 22:02:55.323595 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.380799447Z I0308 22:02:55.380669 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.432435692Z I0308 22:02:55.432292 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.524440418Z I0308 22:02:55.524344 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.580618581Z I0308 22:02:55.580544 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.632557193Z I0308 22:02:55.631748 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.724212071Z I0308 22:02:55.724152 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.766944345Z E0308 22:02:55.766869 1 remote_available_controller.go:470] "Unhandled Error" err="v1.security.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401" logger="UnhandledError" 2026-03-08T22:02:55.780817354Z I0308 22:02:55.780745 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.832313404Z I0308 22:02:55.832222 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.924308681Z I0308 22:02:55.924149 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:55.980533524Z I0308 22:02:55.980430 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:56.032931788Z I0308 22:02:56.032801 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:56.124021412Z I0308 22:02:56.123926 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:56.179682279Z I0308 22:02:56.179609 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:56.324127493Z I0308 22:02:56.324034 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-08T22:02:56.361762764Z E0308 22:02:56.361670 1 remote_available_controller.go:470] "Unhandled Error" err="v1.template.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401" logger="UnhandledError" 2026-03-08T22:02:56.380493249Z I0308 22:02:56.380409 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015153371026031146 0ustar00000000000000002026-03-08T21:55:42.912244465Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115153371026036730 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-mww2c2026-03-08T22:00:42.505221138Z I0308 22:00:42.503979 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-08T22:00:42.505221138Z I0308 22:00:42.504152 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T22:00:42.505221138Z I0308 22:00:42.504807 1 observer_polling.go:159] Starting file observer 2026-03-08T22:01:39.292036325Z I0308 22:01:39.291946 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-08T22:01:39.564372873Z I0308 22:01:39.564055 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T22:01:39.564372873Z W0308 22:01:39.564093 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:39.564372873Z W0308 22:01:39.564098 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:39.564372873Z W0308 22:01:39.564102 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T22:01:39.564372873Z W0308 22:01:39.564105 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T22:01:39.564372873Z W0308 22:01:39.564108 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T22:01:39.564372873Z W0308 22:01:39.564111 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T22:01:39.571514747Z I0308 22:01:39.571472 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-08T22:01:39.572418371Z I0308 22:01:39.572397 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-08T22:01:39.572782310Z I0308 22:01:39.572763 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-03-08T22:01:39.573125118Z I0308 22:01:39.573064 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T22:01:39.573185270Z I0308 22:01:39.573172 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T22:01:39.573253912Z I0308 22:01:39.573234 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T22:01:39.573402865Z I0308 22:01:39.573386 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T22:01:39.573556359Z I0308 22:01:39.573539 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T22:01:39.573588480Z I0308 22:01:39.573578 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:01:39.574015852Z I0308 22:01:39.573995 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T22:01:39.574098244Z I0308 22:01:39.574067 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:39.674292312Z I0308 22:01:39.674248 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:39.674393815Z I0308 22:01:39.674383 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T22:01:39.674502478Z I0308 22:01:39.674492 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000004264115153371026037133 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-mww2c2026-03-08T21:58:44.820691006Z I0308 21:58:44.820677 1 base_controller.go:113] All EventWatchController workers have been terminated 2026-03-08T21:58:44.820707597Z I0308 21:58:44.820691 1 base_controller.go:123] Shutting down worker of kube-apiserver-Node controller ... 2026-03-08T21:58:44.820707597Z I0308 21:58:44.820699 1 base_controller.go:113] All kube-apiserver-Node workers have been terminated 2026-03-08T21:58:44.820724677Z I0308 21:58:44.820706 1 controller_manager.go:54] kube-apiserver-Node controller terminated 2026-03-08T21:58:44.820724677Z I0308 21:58:44.820716 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-08T21:58:44.820741608Z I0308 21:58:44.820724 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-08T21:58:44.820741608Z I0308 21:58:44.820732 1 controller_manager.go:54] GuardController controller terminated 2026-03-08T21:58:44.820758698Z I0308 21:58:44.820741 1 base_controller.go:123] Shutting down worker of KubeletVersionSkewController controller ... 2026-03-08T21:58:44.820758698Z I0308 21:58:44.820751 1 base_controller.go:113] All KubeletVersionSkewController workers have been terminated 2026-03-08T21:58:44.820831090Z I0308 21:58:44.820790 1 base_controller.go:181] Shutting down CertRotationTimeUpgradeableController ... 2026-03-08T21:58:44.820831090Z I0308 21:58:44.820816 1 base_controller.go:181] Shutting down KubeAPIServerStaticResources-StaticResources ... 2026-03-08T21:58:44.821002734Z I0308 21:58:44.820969 1 base_controller.go:123] Shutting down worker of ServiceAccountIssuerController controller ... 2026-03-08T21:58:44.821002734Z I0308 21:58:44.820980 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-03-08T21:58:44.821023965Z I0308 21:58:44.820983 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-08T21:58:44.821040335Z I0308 21:58:44.821021 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-08T21:58:44.821040335Z I0308 21:58:44.821026 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-08T21:58:44.821057156Z I0308 21:58:44.821039 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-08T21:58:44.821057156Z I0308 21:58:44.821044 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-08T21:58:44.821057156Z I0308 21:58:44.821053 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-08T21:58:44.821107077Z I0308 21:58:44.821058 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-08T21:58:44.821107077Z I0308 21:58:44.821067 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-08T21:58:44.821107077Z I0308 21:58:44.821092 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-08T21:58:44.821107077Z I0308 21:58:44.821102 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-08T21:58:44.821134237Z I0308 21:58:44.821106 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-08T21:58:44.821134237Z I0308 21:58:44.821115 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-08T21:58:44.821134237Z I0308 21:58:44.821119 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-08T21:58:44.821152348Z I0308 21:58:44.821139 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-08T21:58:44.821168668Z I0308 21:58:44.821157 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-08T21:58:44.821184959Z I0308 21:58:44.821166 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-08T21:58:44.821184959Z I0308 21:58:44.821177 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-08T21:58:44.821184959Z I0308 21:58:44.821182 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-08T21:58:44.821202889Z I0308 21:58:44.821188 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-08T21:58:44.821202889Z I0308 21:58:44.821194 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-08T21:58:44.821219760Z I0308 21:58:44.821202 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-08T21:58:44.821219760Z I0308 21:58:44.821206 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-08T21:58:44.821219760Z I0308 21:58:44.821212 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-08T21:58:44.821237750Z I0308 21:58:44.821217 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-08T21:58:44.821237750Z I0308 21:58:44.821226 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-08T21:58:44.821237750Z I0308 21:58:44.821231 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-08T21:58:44.821255541Z I0308 21:58:44.821237 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-08T21:58:44.821255541Z I0308 21:58:44.821242 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-08T21:58:44.821414725Z E0308 21:58:44.821376 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:44.821414725Z I0308 21:58:44.821399 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-08T21:58:44.821414725Z I0308 21:58:44.821407 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-08T21:58:44.821436325Z I0308 21:58:44.821414 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-08T21:58:44.821436325Z I0308 21:58:44.821421 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-08T21:58:44.821436325Z I0308 21:58:44.821431 1 base_controller.go:123] Shutting down worker of kube-apiserver controller ... 2026-03-08T21:58:44.821460936Z I0308 21:58:44.821438 1 base_controller.go:113] All kube-apiserver workers have been terminated 2026-03-08T21:58:44.821477216Z I0308 21:58:44.821466 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionPrune controller ... 2026-03-08T21:58:44.821493367Z I0308 21:58:44.821475 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionPrune workers have been terminated 2026-03-08T21:58:44.821493367Z I0308 21:58:44.821487 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-08T21:58:44.821510217Z I0308 21:58:44.821492 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-08T21:58:44.821510217Z I0308 21:58:44.821501 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-08T21:58:44.821510217Z I0308 21:58:44.821507 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-08T21:58:44.821528277Z I0308 21:58:44.821512 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-08T21:58:44.821588219Z I0308 21:58:44.821555 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-08T21:58:44.821606449Z I0308 21:58:44.821586 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T21:58:44.821677131Z I0308 21:58:44.821645 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="ceafb402852f8a27e3f315acad4089ec4cddfdb9739c0ada8556dc54f2ebeb9f") 2026-03-08T21:58:44.821677131Z I0308 21:58:44.821662 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-08T21:58:44.821696642Z I0308 21:58:44.821685 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-08T21:58:44.821712842Z I0308 21:58:44.821697 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T21:58:44.821729013Z I0308 21:58:44.821711 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-08T21:58:44.821775354Z I0308 21:58:44.821747 1 base_controller.go:123] Shutting down worker of CertRotationTimeUpgradeableController controller ... 2026-03-08T21:58:44.821775354Z I0308 21:58:44.821762 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2026-03-08T21:58:44.821831475Z I0308 21:58:44.821791 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2510432568/tls.crt::/tmp/serving-cert-2510432568/tls.key" 2026-03-08T21:58:44.821884156Z I0308 21:58:44.821853 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-08T21:58:44.821936588Z I0308 21:58:44.821909 1 base_controller.go:123] Shutting down worker of PodSecurityReadinessController controller ... 2026-03-08T21:58:44.821936588Z I0308 21:58:44.821914 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionMigration controller ... 2026-03-08T21:58:44.821936588Z I0308 21:58:44.821927 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionMigration workers have been terminated 2026-03-08T21:58:44.821936588Z I0308 21:58:44.821807 1 base_controller.go:181] Shutting down PodSecurityReadinessController ... 2026-03-08T21:58:44.821965419Z I0308 21:58:44.821938 1 base_controller.go:113] All PodSecurityReadinessController workers have been terminated 2026-03-08T21:58:44.821965419Z I0308 21:58:44.821954 1 base_controller.go:181] Shutting down webhookSupportabilityController ... 2026-03-08T21:58:44.821982870Z I0308 21:58:44.821962 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-08T21:58:44.821982870Z I0308 21:58:44.821968 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-08T21:58:44.822000070Z I0308 21:58:44.821986 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-08T21:58:44.822016561Z I0308 21:58:44.822001 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-08T21:58:44.822016561Z I0308 21:58:44.822009 1 builder.go:335] server exited 2026-03-08T21:58:44.822286708Z W0308 21:58:44.822200 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-08T21:58:44.822286708Z W0308 21:58:44.822226 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-08T21:58:44.822286708Z W0308 21:58:44.822232 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-08T21:58:44.822286708Z E0308 21:58:44.822257 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:44.822353649Z I0308 21:58:44.822281 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"55d921ce-93e4-446a-a485-cd2a48cfe6e8", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 1 count 0 on node "master-0": Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/installer-1-master-0": context canceled 2026-03-08T21:58:44.822444172Z E0308 21:58:44.822390 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-08T21:58:44.822468362Z I0308 21:58:44.822441 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-08T21:58:44.822468362Z I0308 21:58:44.822451 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-08T21:58:44.823435998Z E0308 21:58:44.823376 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:58:44.823435998Z I0308 21:58:44.823409 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-08T21:58:44.823435998Z I0308 21:58:44.823417 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-08T21:58:44.823435998Z I0308 21:58:44.823428 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-08T21:58:44.823478539Z I0308 21:58:44.823434 1 base_controller.go:113] All Installer workers have been terminated 2026-03-08T21:58:44.823478539Z I0308 21:58:44.823442 1 controller_manager.go:54] Installer controller terminated 2026-03-08T21:58:44.824507105Z I0308 21:58:44.824442 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-08T21:58:44.824507105Z I0308 21:58:44.824462 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-08T21:58:44.824507105Z I0308 21:58:44.824470 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-08T21:58:44.835737557Z E0308 21:58:44.835680 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/localhost-recovery-client\": context canceled, \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:58:44.836866606Z I0308 21:58:44.836827 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2026-03-08T21:58:44.836866606Z I0308 21:58:44.836845 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2026-03-08T21:58:49.819103997Z I0308 21:58:49.818994 1 observer_polling.go:162] Shutting down file observer 2026-03-08T21:59:18.826800107Z E0308 21:59:18.826630 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T21:59:18.826800107Z W0308 21:59:18.826739 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-mww2c.json0000640000000000000000000001362015153371026027720 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-68bd585b-mww2c","generateName":"kube-apiserver-operator-68bd585b-","namespace":"openshift-kube-apiserver-operator","uid":"04fb7bdb-fb5a-4187-94a3-67c8f09684ed","resourceVersion":"9446","creationTimestamp":"2026-03-08T21:56:07Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"68bd585b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-68bd585b","uid":"fa3a19dc-f902-4d25-9f90-7dcac0cdd0a8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-03-08T21:57:18Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-08T22:00:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T21:57:19Z","finishedAt":"2026-03-08T21:59:18Z","containerID":"cri-o://00c5ed3578644c2cfcf3b05743187fa1a4e66cf46b816a9e956e779028d0b36b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://f871c547308cba5a44237c75ff4479c8163cef5b1e2a7ff5964a521c14faec67","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007425015153371026025205 0ustar00000000000000002026-03-08T21:58:27.958645416Z cluster-etcd-operator rev \ 2026-03-08T21:58:27.958645416Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-08T21:58:27.958645416Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-08T21:58:27.958645416Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-08T21:58:27.958645416Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-08T21:58:27.958645416Z securityContext: 2026-03-08T21:58:27.958645416Z privileged: true 2026-03-08T21:58:27.958645416Z resources: 2026-03-08T21:58:27.958645416Z requests: 2026-03-08T21:58:27.958645416Z memory: 50Mi 2026-03-08T21:58:27.958645416Z cpu: 10m 2026-03-08T21:58:27.958645416Z env: 2026-03-08T21:58:27.958645416Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-08T21:58:27.958645416Z value: "https://192.168.32.10:2379" 2026-03-08T21:58:27.958645416Z - name: "ETCDCTL_API" 2026-03-08T21:58:27.958645416Z value: "3" 2026-03-08T21:58:27.958645416Z - name: "ETCDCTL_CACERT" 2026-03-08T21:58:27.958645416Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-08T21:58:27.958645416Z - name: "ETCDCTL_CERT" 2026-03-08T21:58:27.958645416Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-08T21:58:27.958645416Z - name: "ETCDCTL_ENDPOINTS" 2026-03-08T21:58:27.958645416Z value: "https://192.168.32.10:2379" 2026-03-08T21:58:27.958645416Z - name: "ETCDCTL_KEY" 2026-03-08T21:58:27.958645416Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-08T21:58:27.958645416Z - name: "ETCD_CIPHER_SUITES" 2026-03-08T21:58:27.958645416Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-08T21:58:27.958645416Z - name: "ETCD_DATA_DIR" 2026-03-08T21:58:27.958645416Z value: "/var/lib/etcd" 2026-03-08T21:58:27.958645416Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-08T21:58:27.958645416Z value: "2500" 2026-03-08T21:58:27.958645416Z - name: "ETCD_ENABLE_PPROF" 2026-03-08T21:58:27.958645416Z value: "true" 2026-03-08T21:58:27.958645416Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-08T21:58:27.958645416Z value: "1" 2026-03-08T21:58:27.958645416Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-08T21:58:27.958774359Z value: "200ms" 2026-03-08T21:58:27.958774359Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-08T21:58:27.958774359Z value: "5s" 2026-03-08T21:58:27.958774359Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-08T21:58:27.958774359Z value: "500" 2026-03-08T21:58:27.958774359Z - name: "ETCD_IMAGE" 2026-03-08T21:58:27.958774359Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b" 2026-03-08T21:58:27.958774359Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-08T21:58:27.958774359Z value: "existing" 2026-03-08T21:58:27.958774359Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-08T21:58:27.958774359Z value: "8589934592" 2026-03-08T21:58:27.958774359Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-08T21:58:27.958774359Z value: "true" 2026-03-08T21:58:27.958774359Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-08T21:58:27.958774359Z value: "TLS1.2" 2026-03-08T21:58:27.958774359Z - name: "NODE_master_0_ETCD_NAME" 2026-03-08T21:58:27.958774359Z value: "master-0" 2026-03-08T21:58:27.958774359Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-08T21:58:27.958774359Z value: "192.168.32.10" 2026-03-08T21:58:27.958774359Z - name: "NODE_master_0_IP" 2026-03-08T21:58:27.958774359Z value: "192.168.32.10" 2026-03-08T21:58:27.958774359Z volumeMounts: 2026-03-08T21:58:27.958774359Z - mountPath: /var/lib/etcd 2026-03-08T21:58:27.958774359Z name: data-dir 2026-03-08T21:58:27.958774359Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-08T21:58:27.958774359Z name: cert-dir 2026-03-08T21:58:27.958774359Z hostNetwork: true 2026-03-08T21:58:27.958774359Z priority: 2000001000 2026-03-08T21:58:27.958774359Z priorityClassName: system-node-critical 2026-03-08T21:58:27.958774359Z tolerations: 2026-03-08T21:58:27.958774359Z - operator: "Exists" 2026-03-08T21:58:27.958774359Z volumes: 2026-03-08T21:58:27.958774359Z - hostPath: 2026-03-08T21:58:27.958774359Z path: /etc/kubernetes/manifests 2026-03-08T21:58:27.958774359Z name: static-pod-dir 2026-03-08T21:58:27.958774359Z - hostPath: 2026-03-08T21:58:27.958774359Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-08T21:58:27.958774359Z name: resource-dir 2026-03-08T21:58:27.958774359Z - hostPath: 2026-03-08T21:58:27.958774359Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-08T21:58:27.958774359Z name: cert-dir 2026-03-08T21:58:27.958774359Z - hostPath: 2026-03-08T21:58:27.958774359Z path: /var/lib/etcd 2026-03-08T21:58:27.958774359Z type: "" 2026-03-08T21:58:27.958774359Z name: data-dir 2026-03-08T21:58:27.958774359Z - hostPath: 2026-03-08T21:58:27.958774359Z path: /usr/local/bin 2026-03-08T21:58:27.958774359Z name: usr-local-bin 2026-03-08T21:58:27.958774359Z - hostPath: 2026-03-08T21:58:27.958774359Z path: /var/log/etcd 2026-03-08T21:58:27.958774359Z name: log-dir 2026-03-08T21:58:27.958774359Z - hostPath: 2026-03-08T21:58:27.958774359Z path: /etc/kubernetes 2026-03-08T21:58:27.958774359Z name: config-dir 2026-03-08T21:58:27.958774359Z - hostPath: 2026-03-08T21:58:27.958774359Z path: /var/lib/etcd-auto-backup 2026-03-08T21:58:27.958774359Z name: etcd-auto-backup-dir 2026-03-08T21:58:27.965443312Z I0308 21:58:27.965412 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-08T21:58:27.965696179Z I0308 21:58:27.965682 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-08T21:58:27.965806752Z I0308 21:58:27.965713 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-08T21:58:27.965806752Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-08T21:58:42.156397070Z W0308 21:58:42.156234 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189afc922698af3a.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:57a34dbc-eb6d-44f5-b1aa-4762b69382ed,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-03-08 21:58:27.966676794 +0000 UTC m=+30.762756336,LastTimestamp:2026-03-08 21:58:27.966676794 +0000 UTC m=+30.762756336,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: the server was unable to return a response in the time allotted, but may still be processing the request (post events) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615153371026023477 0ustar00000000000000002026-03-08T22:00:32.423916634Z I0308 22:00:32.423551 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215153371026024174 0ustar00000000000000002026-03-08T22:00:22.188977470Z I0308 22:00:22.188728 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-08T22:01:21.032787664Z I0308 22:01:21.032704 1 etcdcli_pool.go:70] creating a new cached client 2026-03-08T22:01:41.034476558Z I0308 22:01:41.034013 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615153371026024353 0ustar00000000000000002026-03-08T22:00:21.821190107Z {"level":"info","ts":"2026-03-08T22:00:21.820841Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-08T22:00:21.823136507Z {"level":"info","ts":"2026-03-08T22:00:21.822990Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-08T22:00:21.823868166Z {"level":"info","ts":"2026-03-08T22:00:21.823786Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-08T22:00:21.824046861Z {"level":"info","ts":"2026-03-08T22:00:21.823932Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-08T22:00:21.824065681Z {"level":"info","ts":"2026-03-08T22:00:21.824030Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc0004d6000/192.168.32.10:9978\""} 2026-03-08T22:00:21.824203865Z {"level":"info","ts":"2026-03-08T22:00:21.824136Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc0004d6000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-08T22:00:21.824251316Z {"level":"info","ts":"2026-03-08T22:00:21.824196Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-08T22:00:21.824771279Z {"level":"info","ts":"2026-03-08T22:00:21.824706Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-08T22:00:21.824886522Z {"level":"info","ts":"2026-03-08T22:00:21.824793Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-08T22:00:21.824980394Z {"level":"info","ts":"2026-03-08T22:00:21.824937Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc00007e8e0 } }"} 2026-03-08T22:00:21.825001135Z {"level":"info","ts":"2026-03-08T22:00:21.824980Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-08T22:00:21.825082527Z {"level":"info","ts":"2026-03-08T22:00:21.825027Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-08T22:00:21.825147628Z {"level":"info","ts":"2026-03-08T22:00:21.825075Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-08T22:00:21.825294233Z {"level":"info","ts":"2026-03-08T22:00:21.825227Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-08T22:00:21.825410076Z {"level":"info","ts":"2026-03-08T22:00:21.825349Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-08T22:00:21.825581840Z {"level":"info","ts":"2026-03-08T22:00:21.825475Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, CONNECTING"} 2026-03-08T22:00:21.826085603Z {"level":"info","ts":"2026-03-08T22:00:21.826018Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:21.826223276Z {"level":"warn","ts":"2026-03-08T22:00:21.826164Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:21.826342109Z {"level":"info","ts":"2026-03-08T22:00:21.826290Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:21.826443892Z {"level":"info","ts":"2026-03-08T22:00:21.826396Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, TRANSIENT_FAILURE"} 2026-03-08T22:00:21.826515684Z {"level":"info","ts":"2026-03-08T22:00:21.826488Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-08T22:00:21.826829283Z {"level":"info","ts":"2026-03-08T22:00:21.826778Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-08T22:00:21.826943715Z {"level":"info","ts":"2026-03-08T22:00:21.826916Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-08T22:00:21.827482229Z {"level":"info","ts":"2026-03-08T22:00:21.827380Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-08T22:00:21.827482229Z {"level":"info","ts":"2026-03-08T22:00:21.827452Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-08T22:00:21.827482229Z {"level":"info","ts":"2026-03-08T22:00:21.827469Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-08T22:00:21.827542290Z {"level":"info","ts":"2026-03-08T22:00:21.827481Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-08T22:00:21.827927950Z {"level":"info","ts":"2026-03-08T22:00:21.827841Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-08T22:00:22.827529669Z {"level":"info","ts":"2026-03-08T22:00:22.827406Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:22.827529669Z {"level":"info","ts":"2026-03-08T22:00:22.827471Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, IDLE"} 2026-03-08T22:00:22.827641421Z {"level":"info","ts":"2026-03-08T22:00:22.827504Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-08T22:00:22.827641421Z {"level":"info","ts":"2026-03-08T22:00:22.827531Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-08T22:00:22.827830057Z {"level":"info","ts":"2026-03-08T22:00:22.827729Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, CONNECTING"} 2026-03-08T22:00:22.828018062Z {"level":"info","ts":"2026-03-08T22:00:22.827941Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:22.828042482Z {"level":"warn","ts":"2026-03-08T22:00:22.827998Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:22.828176076Z {"level":"info","ts":"2026-03-08T22:00:22.828054Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:22.828206357Z {"level":"info","ts":"2026-03-08T22:00:22.828178Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, TRANSIENT_FAILURE"} 2026-03-08T22:00:24.211145632Z {"level":"info","ts":"2026-03-08T22:00:24.210907Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:24.211145632Z {"level":"info","ts":"2026-03-08T22:00:24.211003Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, IDLE"} 2026-03-08T22:00:24.211145632Z {"level":"info","ts":"2026-03-08T22:00:24.211046Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-08T22:00:24.211145632Z {"level":"info","ts":"2026-03-08T22:00:24.211132Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-08T22:00:24.211401898Z {"level":"info","ts":"2026-03-08T22:00:24.211314Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, CONNECTING"} 2026-03-08T22:00:24.211591153Z {"level":"info","ts":"2026-03-08T22:00:24.211556Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:24.211653605Z {"level":"warn","ts":"2026-03-08T22:00:24.211612Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:24.211682936Z {"level":"info","ts":"2026-03-08T22:00:24.211648Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:24.211682936Z {"level":"info","ts":"2026-03-08T22:00:24.211675Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, TRANSIENT_FAILURE"} 2026-03-08T22:00:27.073347631Z {"level":"info","ts":"2026-03-08T22:00:27.073182Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:27.073347631Z {"level":"info","ts":"2026-03-08T22:00:27.073274Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, IDLE"} 2026-03-08T22:00:27.073470144Z {"level":"info","ts":"2026-03-08T22:00:27.073323Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-08T22:00:27.073470144Z {"level":"info","ts":"2026-03-08T22:00:27.073369Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-08T22:00:27.073658528Z {"level":"info","ts":"2026-03-08T22:00:27.073556Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, CONNECTING"} 2026-03-08T22:00:27.073966736Z {"level":"info","ts":"2026-03-08T22:00:27.073896Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:27.074113090Z {"level":"warn","ts":"2026-03-08T22:00:27.074055Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:27.074199862Z {"level":"info","ts":"2026-03-08T22:00:27.074176Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:27.074286054Z {"level":"info","ts":"2026-03-08T22:00:27.074266Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, TRANSIENT_FAILURE"} 2026-03-08T22:00:31.262831974Z {"level":"info","ts":"2026-03-08T22:00:31.262648Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-08T22:00:31.262831974Z {"level":"info","ts":"2026-03-08T22:00:31.262761Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, IDLE"} 2026-03-08T22:00:31.262937096Z {"level":"info","ts":"2026-03-08T22:00:31.262830Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-08T22:00:31.262937096Z {"level":"info","ts":"2026-03-08T22:00:31.262889Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-08T22:00:31.263174362Z {"level":"info","ts":"2026-03-08T22:00:31.263116Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, CONNECTING"} 2026-03-08T22:00:31.274386062Z {"level":"info","ts":"2026-03-08T22:00:31.274249Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-08T22:00:31.274438463Z {"level":"info","ts":"2026-03-08T22:00:31.274362Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000599620, READY"} 2026-03-08T22:00:31.274490894Z {"level":"info","ts":"2026-03-08T22:00:31.274453Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-08T22:00:31.274507735Z {"level":"info","ts":"2026-03-08T22:00:31.274492Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000014302515153371026022710 0ustar00000000000000002026-03-08T22:02:41.582397721Z {"level":"info","ts":"2026-03-08T22:02:41.582343Z","caller":"traceutil/trace.go:171","msg":"trace[1875672688] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-dns-operator; range_end:; response_count:1; response_revision:10791; }","duration":"167.679453ms","start":"2026-03-08T22:02:41.414655Z","end":"2026-03-08T22:02:41.582335Z","steps":["trace[1875672688] 'agreement among raft nodes before linearized reading' (duration: 167.652373ms)"],"step_count":1} 2026-03-08T22:02:41.582542135Z {"level":"info","ts":"2026-03-08T22:02:41.582493Z","caller":"traceutil/trace.go:171","msg":"trace[1265583369] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-cluster-machine-approver/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"167.843707ms","start":"2026-03-08T22:02:41.414641Z","end":"2026-03-08T22:02:41.582485Z","steps":["trace[1265583369] 'agreement among raft nodes before linearized reading' (duration: 167.823237ms)"],"step_count":1} 2026-03-08T22:02:41.582683628Z {"level":"info","ts":"2026-03-08T22:02:41.582605Z","caller":"traceutil/trace.go:171","msg":"trace[1766826916] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-machine-api/machine-api-controllers; range_end:; response_count:1; response_revision:10791; }","duration":"167.94985ms","start":"2026-03-08T22:02:41.414648Z","end":"2026-03-08T22:02:41.582598Z","steps":["trace[1766826916] 'agreement among raft nodes before linearized reading' (duration: 167.92759ms)"],"step_count":1} 2026-03-08T22:02:41.582831352Z {"level":"info","ts":"2026-03-08T22:02:41.582778Z","caller":"traceutil/trace.go:171","msg":"trace[963829747] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-ingress-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"168.886723ms","start":"2026-03-08T22:02:41.413880Z","end":"2026-03-08T22:02:41.582767Z","steps":["trace[963829747] 'agreement among raft nodes before linearized reading' (duration: 168.862963ms)"],"step_count":1} 2026-03-08T22:02:41.583000686Z {"level":"info","ts":"2026-03-08T22:02:41.582947Z","caller":"traceutil/trace.go:171","msg":"trace[1858394049] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-service-ca-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"169.070278ms","start":"2026-03-08T22:02:41.413865Z","end":"2026-03-08T22:02:41.582936Z","steps":["trace[1858394049] 'agreement among raft nodes before linearized reading' (duration: 169.045787ms)"],"step_count":1} 2026-03-08T22:02:41.583060228Z {"level":"info","ts":"2026-03-08T22:02:41.582982Z","caller":"traceutil/trace.go:171","msg":"trace[1503196598] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-cluster-node-tuning-operator; range_end:; response_count:1; response_revision:10791; }","duration":"165.578208ms","start":"2026-03-08T22:02:41.417384Z","end":"2026-03-08T22:02:41.582962Z","steps":["trace[1503196598] 'agreement among raft nodes before linearized reading' (duration: 165.507836ms)"],"step_count":1} 2026-03-08T22:02:41.583178431Z {"level":"info","ts":"2026-03-08T22:02:41.583129Z","caller":"traceutil/trace.go:171","msg":"trace[1818593928] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-kube-scheduler-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"169.437378ms","start":"2026-03-08T22:02:41.413682Z","end":"2026-03-08T22:02:41.583119Z","steps":["trace[1818593928] 'agreement among raft nodes before linearized reading' (duration: 169.379917ms)"],"step_count":1} 2026-03-08T22:02:41.583342146Z {"level":"info","ts":"2026-03-08T22:02:41.583295Z","caller":"traceutil/trace.go:171","msg":"trace[1292105956] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-controller-manager-operator; range_end:; response_count:1; response_revision:10791; }","duration":"166.095222ms","start":"2026-03-08T22:02:41.417156Z","end":"2026-03-08T22:02:41.583251Z","steps":["trace[1292105956] 'agreement among raft nodes before linearized reading' (duration: 165.994999ms)"],"step_count":1} 2026-03-08T22:02:41.583418378Z {"level":"info","ts":"2026-03-08T22:02:41.583371Z","caller":"traceutil/trace.go:171","msg":"trace[1881536598] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/credentialsrequests.cloudcredential.openshift.io; range_end:; response_count:1; response_revision:10791; }","duration":"169.739856ms","start":"2026-03-08T22:02:41.413623Z","end":"2026-03-08T22:02:41.583363Z","steps":["trace[1881536598] 'agreement among raft nodes before linearized reading' (duration: 169.716946ms)"],"step_count":1} 2026-03-08T22:02:41.583616213Z {"level":"info","ts":"2026-03-08T22:02:41.583540Z","caller":"traceutil/trace.go:171","msg":"trace[481104168] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-cluster-csi-drivers; range_end:; response_count:1; response_revision:10791; }","duration":"169.908532ms","start":"2026-03-08T22:02:41.413621Z","end":"2026-03-08T22:02:41.583529Z","steps":["trace[481104168] 'agreement among raft nodes before linearized reading' (duration: 169.883671ms)"],"step_count":1} 2026-03-08T22:02:41.583690985Z {"level":"info","ts":"2026-03-08T22:02:41.583645Z","caller":"traceutil/trace.go:171","msg":"trace[1766366570] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-etcd-operator; range_end:; response_count:1; response_revision:10791; }","duration":"170.025374ms","start":"2026-03-08T22:02:41.413614Z","end":"2026-03-08T22:02:41.583639Z","steps":["trace[1766366570] 'agreement among raft nodes before linearized reading' (duration: 170.003434ms)"],"step_count":1} 2026-03-08T22:02:41.583781967Z {"level":"info","ts":"2026-03-08T22:02:41.583729Z","caller":"traceutil/trace.go:171","msg":"trace[1517743592] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-cluster-version/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"170.110276ms","start":"2026-03-08T22:02:41.413612Z","end":"2026-03-08T22:02:41.583723Z","steps":["trace[1517743592] 'agreement among raft nodes before linearized reading' (duration: 170.091516ms)"],"step_count":1} 2026-03-08T22:02:41.583832098Z {"level":"info","ts":"2026-03-08T22:02:41.583786Z","caller":"traceutil/trace.go:171","msg":"trace[1468884572] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-cluster-machine-approver; range_end:; response_count:1; response_revision:10791; }","duration":"121.028888ms","start":"2026-03-08T22:02:41.462748Z","end":"2026-03-08T22:02:41.583777Z","steps":["trace[1468884572] 'agreement among raft nodes before linearized reading' (duration: 121.008387ms)"],"step_count":1} 2026-03-08T22:02:41.583913500Z {"level":"info","ts":"2026-03-08T22:02:41.583871Z","caller":"traceutil/trace.go:171","msg":"trace[1233298983] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-console; range_end:; response_count:0; response_revision:10791; }","duration":"121.612823ms","start":"2026-03-08T22:02:41.462253Z","end":"2026-03-08T22:02:41.583866Z","steps":["trace[1233298983] 'agreement among raft nodes before linearized reading' (duration: 121.600483ms)"],"step_count":1} 2026-03-08T22:02:41.583913500Z {"level":"info","ts":"2026-03-08T22:02:41.583877Z","caller":"traceutil/trace.go:171","msg":"trace[834848713] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/baremetalhosts.metal3.io; range_end:; response_count:1; response_revision:10791; }","duration":"170.307751ms","start":"2026-03-08T22:02:41.413561Z","end":"2026-03-08T22:02:41.583869Z","steps":["trace[834848713] 'agreement among raft nodes before linearized reading' (duration: 170.27697ms)"],"step_count":1} 2026-03-08T22:02:41.583974162Z {"level":"info","ts":"2026-03-08T22:02:41.583934Z","caller":"traceutil/trace.go:171","msg":"trace[268167074] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-console-operator; range_end:; response_count:0; response_revision:10791; }","duration":"122.594949ms","start":"2026-03-08T22:02:41.461334Z","end":"2026-03-08T22:02:41.583929Z","steps":["trace[268167074] 'agreement among raft nodes before linearized reading' (duration: 122.586998ms)"],"step_count":1} 2026-03-08T22:02:41.584055154Z {"level":"info","ts":"2026-03-08T22:02:41.584004Z","caller":"traceutil/trace.go:171","msg":"trace[1131291140] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/builds/; range_end:/kubernetes.io/config.openshift.io/builds0; response_count:0; response_revision:10791; }","duration":"136.847976ms","start":"2026-03-08T22:02:41.447147Z","end":"2026-03-08T22:02:41.583995Z","steps":["trace[1131291140] 'agreement among raft nodes before linearized reading' (duration: 136.833676ms)"],"step_count":1} 2026-03-08T22:02:41.584146326Z {"level":"info","ts":"2026-03-08T22:02:41.584065Z","caller":"traceutil/trace.go:171","msg":"trace[1839347558] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-controller-manager-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"170.529617ms","start":"2026-03-08T22:02:41.413526Z","end":"2026-03-08T22:02:41.584055Z","steps":["trace[1839347558] 'agreement among raft nodes before linearized reading' (duration: 170.509166ms)"],"step_count":1} 2026-03-08T22:02:41.584226798Z {"level":"info","ts":"2026-03-08T22:02:41.584179Z","caller":"traceutil/trace.go:171","msg":"trace[1592078461] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-apiserver-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"145.655034ms","start":"2026-03-08T22:02:41.438515Z","end":"2026-03-08T22:02:41.584170Z","steps":["trace[1592078461] 'agreement among raft nodes before linearized reading' (duration: 145.623743ms)"],"step_count":1} 2026-03-08T22:02:41.584318200Z {"level":"info","ts":"2026-03-08T22:02:41.584255Z","caller":"traceutil/trace.go:171","msg":"trace[567012905] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-kube-controller-manager-operator; range_end:; response_count:1; response_revision:10791; }","duration":"170.700471ms","start":"2026-03-08T22:02:41.413544Z","end":"2026-03-08T22:02:41.584244Z","steps":["trace[567012905] 'agreement among raft nodes before linearized reading' (duration: 170.67672ms)"],"step_count":1} 2026-03-08T22:02:41.584387082Z {"level":"info","ts":"2026-03-08T22:02:41.584344Z","caller":"traceutil/trace.go:171","msg":"trace[1814632612] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/clusterautoscalers.autoscaling.openshift.io; range_end:; response_count:1; response_revision:10791; }","duration":"165.382584ms","start":"2026-03-08T22:02:41.418954Z","end":"2026-03-08T22:02:41.584337Z","steps":["trace[1814632612] 'agreement among raft nodes before linearized reading' (duration: 165.361983ms)"],"step_count":1} 2026-03-08T22:02:41.584387082Z {"level":"info","ts":"2026-03-08T22:02:41.584356Z","caller":"traceutil/trace.go:171","msg":"trace[2002911741] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/csisnapshotcontrollers.operator.openshift.io; range_end:; response_count:1; response_revision:10791; }","duration":"170.791023ms","start":"2026-03-08T22:02:41.413558Z","end":"2026-03-08T22:02:41.584349Z","steps":["trace[2002911741] 'agreement among raft nodes before linearized reading' (duration: 170.772143ms)"],"step_count":1} 2026-03-08T22:02:41.584506745Z {"level":"info","ts":"2026-03-08T22:02:41.584464Z","caller":"traceutil/trace.go:171","msg":"trace[1101730378] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-kube-scheduler-operator; range_end:; response_count:1; response_revision:10791; }","duration":"165.858905ms","start":"2026-03-08T22:02:41.418598Z","end":"2026-03-08T22:02:41.584457Z","steps":["trace[1101730378] 'agreement among raft nodes before linearized reading' (duration: 165.837774ms)"],"step_count":1} 2026-03-08T22:02:41.584564407Z {"level":"info","ts":"2026-03-08T22:02:41.584517Z","caller":"traceutil/trace.go:171","msg":"trace[505883134] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-etcd-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"171.026799ms","start":"2026-03-08T22:02:41.413482Z","end":"2026-03-08T22:02:41.584509Z","steps":["trace[505883134] 'agreement among raft nodes before linearized reading' (duration: 171.008129ms)"],"step_count":1} 2026-03-08T22:02:41.584623098Z {"level":"info","ts":"2026-03-08T22:02:41.584582Z","caller":"traceutil/trace.go:171","msg":"trace[1714346212] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-cluster-storage-operator/prometheus; range_end:; response_count:1; response_revision:10791; }","duration":"166.256845ms","start":"2026-03-08T22:02:41.418319Z","end":"2026-03-08T22:02:41.584576Z","steps":["trace[1714346212] 'agreement among raft nodes before linearized reading' (duration: 166.236424ms)"],"step_count":1} 2026-03-08T22:02:41.584711691Z {"level":"info","ts":"2026-03-08T22:02:41.584663Z","caller":"traceutil/trace.go:171","msg":"trace[294816119] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-authentication-operator; range_end:; response_count:1; response_revision:10791; }","duration":"171.186123ms","start":"2026-03-08T22:02:41.413470Z","end":"2026-03-08T22:02:41.584656Z","steps":["trace[294816119] 'agreement among raft nodes before linearized reading' (duration: 171.165872ms)"],"step_count":1} 2026-03-08T22:02:41.584789353Z {"level":"info","ts":"2026-03-08T22:02:41.584745Z","caller":"traceutil/trace.go:171","msg":"trace[839472420] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-node-cluster-rsrc-use; range_end:; response_count:1; response_revision:10791; }","duration":"167.545759ms","start":"2026-03-08T22:02:41.417134Z","end":"2026-03-08T22:02:41.584680Z","steps":["trace[839472420] 'agreement among raft nodes before linearized reading' (duration: 167.337433ms)"],"step_count":1} 2026-03-08T22:02:41.584865575Z {"level":"info","ts":"2026-03-08T22:02:41.584817Z","caller":"traceutil/trace.go:171","msg":"trace[1438508367] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/apiservers.config.openshift.io; range_end:; response_count:1; response_revision:10791; }","duration":"166.77115ms","start":"2026-03-08T22:02:41.418039Z","end":"2026-03-08T22:02:41.584810Z","steps":["trace[1438508367] 'agreement among raft nodes before linearized reading' (duration: 166.747559ms)"],"step_count":1} 2026-03-08T22:02:41.584865575Z {"level":"info","ts":"2026-03-08T22:02:41.584829Z","caller":"traceutil/trace.go:171","msg":"trace[1108926919] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:cloud-credential-operator:cluster-reader; range_end:; response_count:1; response_revision:10791; }","duration":"171.351328ms","start":"2026-03-08T22:02:41.413470Z","end":"2026-03-08T22:02:41.584821Z","steps":["trace[1108926919] 'agreement among raft nodes before linearized reading' (duration: 171.329757ms)"],"step_count":1} 2026-03-08T22:02:41.585110811Z {"level":"info","ts":"2026-03-08T22:02:41.584977Z","caller":"traceutil/trace.go:171","msg":"trace[1596363681] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-cloud-credential-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"167.426467ms","start":"2026-03-08T22:02:41.417538Z","end":"2026-03-08T22:02:41.584965Z","steps":["trace[1596363681] 'agreement among raft nodes before linearized reading' (duration: 167.398636ms)"],"step_count":1} 2026-03-08T22:02:41.585110811Z {"level":"info","ts":"2026-03-08T22:02:41.585025Z","caller":"traceutil/trace.go:171","msg":"trace[410569069] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:service-ca-operator; range_end:; response_count:1; response_revision:10791; }","duration":"171.660346ms","start":"2026-03-08T22:02:41.413358Z","end":"2026-03-08T22:02:41.585019Z","steps":["trace[410569069] 'agreement among raft nodes before linearized reading' (duration: 171.642296ms)"],"step_count":1} 2026-03-08T22:02:41.585180673Z {"level":"info","ts":"2026-03-08T22:02:41.585139Z","caller":"traceutil/trace.go:171","msg":"trace[1881838156] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/olms/cluster; range_end:; response_count:1; response_revision:10791; }","duration":"167.687853ms","start":"2026-03-08T22:02:41.417444Z","end":"2026-03-08T22:02:41.585132Z","steps":["trace[1881838156] 'agreement among raft nodes before linearized reading' (duration: 167.661472ms)"],"step_count":1} 2026-03-08T22:02:41.585359257Z {"level":"info","ts":"2026-03-08T22:02:41.585310Z","caller":"traceutil/trace.go:171","msg":"trace[709277274] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-cloud-controller-manager-operator; range_end:; response_count:1; response_revision:10791; }","duration":"168.233317ms","start":"2026-03-08T22:02:41.417058Z","end":"2026-03-08T22:02:41.585292Z","steps":["trace[709277274] 'agreement among raft nodes before linearized reading' (duration: 168.190796ms)"],"step_count":1} 2026-03-08T22:02:41.585504051Z {"level":"info","ts":"2026-03-08T22:02:41.583320Z","caller":"traceutil/trace.go:171","msg":"trace[227300236] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-dns-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"169.634164ms","start":"2026-03-08T22:02:41.413677Z","end":"2026-03-08T22:02:41.583312Z","steps":["trace[227300236] 'agreement among raft nodes before linearized reading' (duration: 169.606433ms)"],"step_count":1} 2026-03-08T22:02:41.585641225Z {"level":"info","ts":"2026-03-08T22:02:41.585598Z","caller":"traceutil/trace.go:171","msg":"trace[103210637] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/configs.imageregistry.operator.openshift.io; range_end:; response_count:1; response_revision:10791; }","duration":"168.563245ms","start":"2026-03-08T22:02:41.417024Z","end":"2026-03-08T22:02:41.585587Z","steps":["trace[103210637] 'agreement among raft nodes before linearized reading' (duration: 168.520874ms)"],"step_count":1} 2026-03-08T22:02:41.585822839Z {"level":"info","ts":"2026-03-08T22:02:41.585782Z","caller":"traceutil/trace.go:171","msg":"trace[1597812695] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consoleclidownloads.console.openshift.io; range_end:; response_count:1; response_revision:10791; }","duration":"168.771331ms","start":"2026-03-08T22:02:41.417001Z","end":"2026-03-08T22:02:41.585773Z","steps":["trace[1597812695] 'agreement among raft nodes before linearized reading' (duration: 168.74736ms)"],"step_count":1} 2026-03-08T22:02:41.585876450Z {"level":"info","ts":"2026-03-08T22:02:41.584765Z","caller":"traceutil/trace.go:171","msg":"trace[1558364706] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/configs.samples.operator.openshift.io; range_end:; response_count:1; response_revision:10791; }","duration":"166.583424ms","start":"2026-03-08T22:02:41.418170Z","end":"2026-03-08T22:02:41.584753Z","steps":["trace[1558364706] 'agreement among raft nodes before linearized reading' (duration: 166.550903ms)"],"step_count":1} 2026-03-08T22:02:41.586175979Z {"level":"info","ts":"2026-03-08T22:02:41.586128Z","caller":"traceutil/trace.go:171","msg":"trace[2022949022] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/registry-monitoring; range_end:; response_count:1; response_revision:10791; }","duration":"169.160301ms","start":"2026-03-08T22:02:41.416957Z","end":"2026-03-08T22:02:41.586117Z","steps":["trace[2022949022] 'agreement among raft nodes before linearized reading' (duration: 169.095169ms)"],"step_count":1} 2026-03-08T22:02:41.586453016Z {"level":"info","ts":"2026-03-08T22:02:41.586404Z","caller":"traceutil/trace.go:171","msg":"trace[1711132386] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/storageversionmigrations.migration.k8s.io; range_end:; response_count:1; response_revision:10791; }","duration":"169.429438ms","start":"2026-03-08T22:02:41.416965Z","end":"2026-03-08T22:02:41.586394Z","steps":["trace[1711132386] 'agreement among raft nodes before linearized reading' (duration: 169.400458ms)"],"step_count":1} 2026-03-08T22:02:41.586619580Z {"level":"info","ts":"2026-03-08T22:02:41.586580Z","caller":"traceutil/trace.go:171","msg":"trace[1464653051] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-machine-api/control-plane-machine-set-operator; range_end:; response_count:1; response_revision:10791; }","duration":"169.658094ms","start":"2026-03-08T22:02:41.416913Z","end":"2026-03-08T22:02:41.586571Z","steps":["trace[1464653051] 'agreement among raft nodes before linearized reading' (duration: 169.631533ms)"],"step_count":1} 2026-03-08T22:02:41.586705742Z {"level":"info","ts":"2026-03-08T22:02:41.585300Z","caller":"traceutil/trace.go:171","msg":"trace[77432231] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:10791; }","duration":"168.136144ms","start":"2026-03-08T22:02:41.417142Z","end":"2026-03-08T22:02:41.585278Z","steps":["trace[77432231] 'agreement among raft nodes before linearized reading' (duration: 168.057152ms)"],"step_count":1} 2026-03-08T22:02:41.586857966Z {"level":"info","ts":"2026-03-08T22:02:41.586801Z","caller":"traceutil/trace.go:171","msg":"trace[1069244416] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-apiserver-operator; range_end:; response_count:1; response_revision:10791; }","duration":"171.06291ms","start":"2026-03-08T22:02:41.415725Z","end":"2026-03-08T22:02:41.586788Z","steps":["trace[1069244416] 'agreement among raft nodes before linearized reading' (duration: 171.02925ms)"],"step_count":1} 2026-03-08T22:02:41.586934328Z {"level":"info","ts":"2026-03-08T22:02:41.582026Z","caller":"traceutil/trace.go:171","msg":"trace[226721265] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:scc:anyuid; range_end:; response_count:1; response_revision:10791; }","duration":"166.355298ms","start":"2026-03-08T22:02:41.415662Z","end":"2026-03-08T22:02:41.582018Z","steps":["trace[226721265] 'agreement among raft nodes before linearized reading' (duration: 166.333738ms)"],"step_count":1} 2026-03-08T22:02:41.587024790Z {"level":"info","ts":"2026-03-08T22:02:41.584984Z","caller":"traceutil/trace.go:171","msg":"trace[948039391] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-machine-api-aws; range_end:; response_count:1; response_revision:10791; }","duration":"171.658706ms","start":"2026-03-08T22:02:41.413316Z","end":"2026-03-08T22:02:41.584974Z","steps":["trace[948039391] 'agreement among raft nodes before linearized reading' (duration: 171.627985ms)"],"step_count":1} 2026-03-08T22:02:41.587673148Z {"level":"info","ts":"2026-03-08T22:02:41.583121Z","caller":"traceutil/trace.go:171","msg":"trace[1113924764] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-insights; range_end:; response_count:1; response_revision:10791; }","duration":"165.878276ms","start":"2026-03-08T22:02:41.417153Z","end":"2026-03-08T22:02:41.583031Z","steps":["trace[1113924764] 'agreement among raft nodes before linearized reading' (duration: 165.783764ms)"],"step_count":1} 2026-03-08T22:02:41.588276773Z {"level":"info","ts":"2026-03-08T22:02:41.582103Z","caller":"traceutil/trace.go:171","msg":"trace[622722707] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics; range_end:; response_count:1; response_revision:10791; }","duration":"166.428081ms","start":"2026-03-08T22:02:41.415636Z","end":"2026-03-08T22:02:41.582064Z","steps":["trace[622722707] 'agreement among raft nodes before linearized reading' (duration: 166.40785ms)"],"step_count":1} 2026-03-08T22:02:41.589491354Z {"level":"warn","ts":"2026-03-08T22:02:41.589414Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"211.156917ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-kube-controller-manager-operator/prometheus-k8s\" ","response":"range_response_count:1 size:1198"} 2026-03-08T22:02:41.589785782Z {"level":"info","ts":"2026-03-08T22:02:41.589730Z","caller":"traceutil/trace.go:171","msg":"trace[1373912760] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-kube-controller-manager-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"211.534796ms","start":"2026-03-08T22:02:41.378176Z","end":"2026-03-08T22:02:41.589711Z","steps":["trace[1373912760] 'agreement among raft nodes before linearized reading' (duration: 211.164727ms)"],"step_count":1} 2026-03-08T22:02:41.590643164Z {"level":"info","ts":"2026-03-08T22:02:41.590539Z","caller":"traceutil/trace.go:171","msg":"trace[830506888] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-machine-config-operator/machine-config-controller; range_end:; response_count:1; response_revision:10791; }","duration":"177.375274ms","start":"2026-03-08T22:02:41.413144Z","end":"2026-03-08T22:02:41.590519Z","steps":["trace[830506888] 'agreement among raft nodes before linearized reading' (duration: 177.323203ms)"],"step_count":1} 2026-03-08T22:02:41.590754867Z {"level":"info","ts":"2026-03-08T22:02:41.590055Z","caller":"traceutil/trace.go:171","msg":"trace[643280101] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-ingress-operator; range_end:; response_count:1; response_revision:10791; }","duration":"176.89323ms","start":"2026-03-08T22:02:41.413146Z","end":"2026-03-08T22:02:41.590039Z","steps":["trace[643280101] 'agreement among raft nodes before linearized reading' (duration: 176.851689ms)"],"step_count":1} 2026-03-08T22:02:41.590937372Z {"level":"warn","ts":"2026-03-08T22:02:41.590578Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"202.911263ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/ingresscontrollers/openshift-ingress-operator/default\" ","response":"range_response_count:1 size:6579"} 2026-03-08T22:02:41.591060525Z {"level":"info","ts":"2026-03-08T22:02:41.591003Z","caller":"traceutil/trace.go:171","msg":"trace[624187803] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/ingresscontrollers/openshift-ingress-operator/default; range_end:; response_count:1; response_revision:10791; }","duration":"203.331244ms","start":"2026-03-08T22:02:41.387651Z","end":"2026-03-08T22:02:41.590983Z","steps":["trace[624187803] 'agreement among raft nodes before linearized reading' (duration: 202.858972ms)"],"step_count":1} 2026-03-08T22:02:41.595249263Z {"level":"warn","ts":"2026-03-08T22:02:41.590549Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"202.968484ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/authentications/cluster\" ","response":"range_response_count:1 size:1100"} 2026-03-08T22:02:41.595249263Z {"level":"info","ts":"2026-03-08T22:02:41.592443Z","caller":"traceutil/trace.go:171","msg":"trace[1784199130] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/authentications/cluster; range_end:; response_count:1; response_revision:10791; }","duration":"204.896064ms","start":"2026-03-08T22:02:41.387519Z","end":"2026-03-08T22:02:41.592415Z","steps":["trace[1784199130] 'agreement among raft nodes before linearized reading' (duration: 202.936333ms)"],"step_count":1} 2026-03-08T22:02:41.595249263Z {"level":"info","ts":"2026-03-08T22:02:41.591123Z","caller":"traceutil/trace.go:171","msg":"trace[1742105091] range","detail":"{range_begin:/kubernetes.io/roles/openshift-authentication/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"173.738299ms","start":"2026-03-08T22:02:41.413319Z","end":"2026-03-08T22:02:41.587057Z","steps":["trace[1742105091] 'agreement among raft nodes before linearized reading' (duration: 173.712108ms)"],"step_count":1} 2026-03-08T22:02:41.595249263Z {"level":"warn","ts":"2026-03-08T22:02:41.591318Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"212.83512ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-gcp\" ","response":"range_response_count:1 size:2527"} 2026-03-08T22:02:41.595249263Z {"level":"info","ts":"2026-03-08T22:02:41.592802Z","caller":"traceutil/trace.go:171","msg":"trace[126264433] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-gcp; range_end:; response_count:1; response_revision:10791; }","duration":"214.372149ms","start":"2026-03-08T22:02:41.378405Z","end":"2026-03-08T22:02:41.592777Z","steps":["trace[126264433] 'agreement among raft nodes before linearized reading' (duration: 212.809639ms)"],"step_count":1} 2026-03-08T22:02:42.101985997Z {"level":"warn","ts":"2026-03-08T22:02:42.101867Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"270.018317ms","expected-duration":"200ms","prefix":"","request":"header: txn: success:> failure:<>>","response":"size:5"} 2026-03-08T22:02:42.101985997Z {"level":"info","ts":"2026-03-08T22:02:42.101959Z","caller":"traceutil/trace.go:171","msg":"trace[2138405266] linearizableReadLoop","detail":"{readStateIndex:11324; appliedIndex:11323; }","duration":"479.230563ms","start":"2026-03-08T22:02:41.622716Z","end":"2026-03-08T22:02:42.101946Z","steps":["trace[2138405266] 'read index received' (duration: 208.97252ms)","trace[2138405266] 'applied index is now lower than readState.Index' (duration: 270.257133ms)"],"step_count":2} 2026-03-08T22:02:42.102084659Z {"level":"warn","ts":"2026-03-08T22:02:42.102052Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"479.340015ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-08T22:02:42.102114130Z {"level":"info","ts":"2026-03-08T22:02:42.102037Z","caller":"traceutil/trace.go:171","msg":"trace[1713599869] transaction","detail":"{read_only:false; number_of_response:0; response_revision:10791; }","duration":"480.967759ms","start":"2026-03-08T22:02:41.621052Z","end":"2026-03-08T22:02:42.102019Z","steps":["trace[1713599869] 'process raft request' (duration: 210.737846ms)","trace[1713599869] 'compare' (duration: 269.982417ms)"],"step_count":2} 2026-03-08T22:02:42.102215493Z {"level":"warn","ts":"2026-03-08T22:02:42.102166Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-08T22:02:41.621034Z","time spent":"481.082821ms","remote":"[::1]:39942","response type":"/etcdserverpb.KV/Txn","request count":0,"request size":0,"response count":0,"response size":29,"request content":"compare: success:> failure:<>"} 2026-03-08T22:02:42.102215493Z {"level":"info","ts":"2026-03-08T22:02:42.102095Z","caller":"traceutil/trace.go:171","msg":"trace[2003531305] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10791; }","duration":"479.381067ms","start":"2026-03-08T22:02:41.622682Z","end":"2026-03-08T22:02:42.102064Z","steps":["trace[2003531305] 'agreement among raft nodes before linearized reading' (duration: 479.333876ms)"],"step_count":1} 2026-03-08T22:02:42.102215493Z {"level":"warn","ts":"2026-03-08T22:02:42.102187Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"465.537169ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-kube-apiserver-operator/kube-apiserver-operator\" ","response":"range_response_count:1 size:2087"} 2026-03-08T22:02:42.102231383Z {"level":"warn","ts":"2026-03-08T22:02:42.102209Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-08T22:02:41.622672Z","time spent":"479.53051ms","remote":"[::1]:36210","response type":"/etcdserverpb.KV/Range","request count":0,"request size":50,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 "} 2026-03-08T22:02:42.102239933Z {"level":"info","ts":"2026-03-08T22:02:42.102222Z","caller":"traceutil/trace.go:171","msg":"trace[1775407172] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-kube-apiserver-operator/kube-apiserver-operator; range_end:; response_count:1; response_revision:10791; }","duration":"465.612561ms","start":"2026-03-08T22:02:41.636599Z","end":"2026-03-08T22:02:42.102212Z","steps":["trace[1775407172] 'agreement among raft nodes before linearized reading' (duration: 465.525798ms)"],"step_count":1} 2026-03-08T22:02:42.102280644Z {"level":"warn","ts":"2026-03-08T22:02:42.102253Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-08T22:02:41.636582Z","time spent":"465.664863ms","remote":"[::1]:39816","response type":"/etcdserverpb.KV/Range","request count":0,"request size":112,"response count":1,"response size":2111,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-kube-apiserver-operator/kube-apiserver-operator\" "} 2026-03-08T22:02:42.102291465Z {"level":"info","ts":"2026-03-08T22:02:42.102271Z","caller":"traceutil/trace.go:171","msg":"trace[477546804] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/marketplace-operator; range_end:; response_count:1; response_revision:10791; }","duration":"139.873875ms","start":"2026-03-08T22:02:41.962380Z","end":"2026-03-08T22:02:42.102254Z","steps":["trace[477546804] 'agreement among raft nodes before linearized reading' (duration: 139.854064ms)"],"step_count":1} 2026-03-08T22:02:42.102305975Z {"level":"info","ts":"2026-03-08T22:02:42.102250Z","caller":"traceutil/trace.go:171","msg":"trace[1132282935] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-cluster-machine-approver/cluster-machine-approver; range_end:; response_count:1; response_revision:10791; }","duration":"114.840717ms","start":"2026-03-08T22:02:41.987383Z","end":"2026-03-08T22:02:42.102224Z","steps":["trace[1132282935] 'agreement among raft nodes before linearized reading' (duration: 114.784736ms)"],"step_count":1} 2026-03-08T22:02:42.102335886Z {"level":"warn","ts":"2026-03-08T22:02:42.102276Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"414.559592ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/aws-ebs-csi-driver-operator\" ","response":"range_response_count:1 size:3006"} 2026-03-08T22:02:42.102385567Z {"level":"info","ts":"2026-03-08T22:02:42.102344Z","caller":"traceutil/trace.go:171","msg":"trace[499424004] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/aws-ebs-csi-driver-operator; range_end:; response_count:1; response_revision:10791; }","duration":"414.671305ms","start":"2026-03-08T22:02:41.687656Z","end":"2026-03-08T22:02:42.102327Z","steps":["trace[499424004] 'agreement among raft nodes before linearized reading' (duration: 414.539681ms)"],"step_count":1} 2026-03-08T22:02:42.102397047Z {"level":"warn","ts":"2026-03-08T22:02:42.102380Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"289.078449ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-service-ca-operator/service-ca-operator\" ","response":"range_response_count:1 size:2022"} 2026-03-08T22:02:42.102408448Z {"level":"warn","ts":"2026-03-08T22:02:42.102391Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"439.734653ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-kube-scheduler-operator/kube-scheduler-operator\" ","response":"range_response_count:1 size:2097"} 2026-03-08T22:02:42.102408448Z {"level":"info","ts":"2026-03-08T22:02:42.102399Z","caller":"traceutil/trace.go:171","msg":"trace[1431516577] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-service-ca-operator/service-ca-operator; range_end:; response_count:1; response_revision:10791; }","duration":"289.12593ms","start":"2026-03-08T22:02:41.813267Z","end":"2026-03-08T22:02:42.102393Z","steps":["trace[1431516577] 'agreement among raft nodes before linearized reading' (duration: 289.087289ms)"],"step_count":1} 2026-03-08T22:02:42.102418488Z {"level":"warn","ts":"2026-03-08T22:02:42.102388Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-08T22:02:41.687641Z","time spent":"414.738547ms","remote":"[::1]:49530","response type":"/etcdserverpb.KV/Range","request count":0,"request size":129,"response count":1,"response size":3030,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/aws-ebs-csi-driver-operator\" "} 2026-03-08T22:02:42.102426768Z {"level":"info","ts":"2026-03-08T22:02:42.102411Z","caller":"traceutil/trace.go:171","msg":"trace[1061821417] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-kube-scheduler-operator/kube-scheduler-operator; range_end:; response_count:1; response_revision:10791; }","duration":"439.792283ms","start":"2026-03-08T22:02:41.662613Z","end":"2026-03-08T22:02:42.102405Z","steps":["trace[1061821417] 'agreement among raft nodes before linearized reading' (duration: 439.749832ms)"],"step_count":1} 2026-03-08T22:02:42.102442908Z {"level":"warn","ts":"2026-03-08T22:02:42.102430Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-08T22:02:41.662592Z","time spent":"439.833175ms","remote":"[::1]:39816","response type":"/etcdserverpb.KV/Range","request count":0,"request size":112,"response count":1,"response size":2121,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-kube-scheduler-operator/kube-scheduler-operator\" "} 2026-03-08T22:02:42.102510070Z {"level":"info","ts":"2026-03-08T22:02:42.102217Z","caller":"traceutil/trace.go:171","msg":"trace[639818000] range","detail":"{range_begin:/kubernetes.io/masterleases/192.168.32.10; range_end:; response_count:1; response_revision:10791; }","duration":"146.33204ms","start":"2026-03-08T22:02:41.955871Z","end":"2026-03-08T22:02:42.102203Z","steps":["trace[639818000] 'agreement among raft nodes before linearized reading' (duration: 146.30848ms)"],"step_count":1} 2026-03-08T22:02:42.102546961Z {"level":"warn","ts":"2026-03-08T22:02:42.102519Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"291.44401ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/endpointslices/\" range_end:\"/kubernetes.io/endpointslices0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-03-08T22:02:42.102557141Z {"level":"info","ts":"2026-03-08T22:02:42.102545Z","caller":"traceutil/trace.go:171","msg":"trace[986268531] range","detail":"{range_begin:/kubernetes.io/endpointslices/; range_end:/kubernetes.io/endpointslices0; response_count:0; response_revision:10791; }","duration":"291.499512ms","start":"2026-03-08T22:02:41.811039Z","end":"2026-03-08T22:02:42.102538Z","steps":["trace[986268531] 'agreement among raft nodes before linearized reading' (duration: 291.403299ms)"],"step_count":1} 2026-03-08T22:02:42.102627083Z {"level":"warn","ts":"2026-03-08T22:02:42.102600Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"239.425316ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/etcds/cluster\" ","response":"range_response_count:1 size:13313"} 2026-03-08T22:02:42.102679874Z {"level":"info","ts":"2026-03-08T22:02:42.102656Z","caller":"traceutil/trace.go:171","msg":"trace[951107649] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/etcds/cluster; range_end:; response_count:1; response_revision:10791; }","duration":"239.520979ms","start":"2026-03-08T22:02:41.863127Z","end":"2026-03-08T22:02:42.102648Z","steps":["trace[951107649] 'agreement among raft nodes before linearized reading' (duration: 239.405976ms)"],"step_count":1} 2026-03-08T22:02:42.102744587Z {"level":"warn","ts":"2026-03-08T22:02:42.102715Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"340.326644ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-apiserver-operator/openshift-apiserver-operator\" ","response":"range_response_count:1 size:2162"} 2026-03-08T22:02:42.102744587Z {"level":"warn","ts":"2026-03-08T22:02:42.102484Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"264.500114ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/openshiftapiservers/cluster\" ","response":"range_response_count:1 size:15596"} 2026-03-08T22:02:42.102744587Z {"level":"warn","ts":"2026-03-08T22:02:42.102725Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"364.910558ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-machine-api/control-plane-machine-set-operator\" ","response":"range_response_count:1 size:1230"} 2026-03-08T22:02:42.102744587Z {"level":"info","ts":"2026-03-08T22:02:42.102735Z","caller":"traceutil/trace.go:171","msg":"trace[1561873065] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-apiserver-operator/openshift-apiserver-operator; range_end:; response_count:1; response_revision:10791; }","duration":"340.380457ms","start":"2026-03-08T22:02:41.762350Z","end":"2026-03-08T22:02:42.102730Z","steps":["trace[1561873065] 'agreement among raft nodes before linearized reading' (duration: 340.337215ms)"],"step_count":1} 2026-03-08T22:02:42.102764068Z {"level":"warn","ts":"2026-03-08T22:02:42.102749Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-08T22:02:41.762330Z","time spent":"340.415057ms","remote":"[::1]:39816","response type":"/etcdserverpb.KV/Range","request count":0,"request size":112,"response count":1,"response size":2186,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-apiserver-operator/openshift-apiserver-operator\" "} 2026-03-08T22:02:42.102764068Z {"level":"info","ts":"2026-03-08T22:02:42.102749Z","caller":"traceutil/trace.go:171","msg":"trace[2136775746] range","detail":"{range_begin:/kubernetes.io/roles/openshift-machine-api/control-plane-machine-set-operator; range_end:; response_count:1; response_revision:10791; }","duration":"364.974511ms","start":"2026-03-08T22:02:41.737768Z","end":"2026-03-08T22:02:42.102742Z","steps":["trace[2136775746] 'agreement among raft nodes before linearized reading' (duration: 364.929019ms)"],"step_count":1} 2026-03-08T22:02:42.102764068Z {"level":"info","ts":"2026-03-08T22:02:42.102747Z","caller":"traceutil/trace.go:171","msg":"trace[12021781] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/openshiftapiservers/cluster; range_end:; response_count:1; response_revision:10791; }","duration":"264.783583ms","start":"2026-03-08T22:02:41.837954Z","end":"2026-03-08T22:02:42.102738Z","steps":["trace[12021781] 'agreement among raft nodes before linearized reading' (duration: 264.30823ms)"],"step_count":1} 2026-03-08T22:02:42.102790378Z {"level":"warn","ts":"2026-03-08T22:02:42.102765Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-08T22:02:41.737742Z","time spent":"365.019362ms","remote":"[::1]:36070","response type":"/etcdserverpb.KV/Range","request count":0,"request size":79,"response count":1,"response size":1254,"request content":"key:\"/kubernetes.io/roles/openshift-machine-api/control-plane-machine-set-operator\" "} 2026-03-08T22:02:42.102837149Z {"level":"info","ts":"2026-03-08T22:02:42.102791Z","caller":"traceutil/trace.go:171","msg":"trace[1641865577] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consoleexternalloglinks.console.openshift.io; range_end:; response_count:1; response_revision:10791; }","duration":"165.528988ms","start":"2026-03-08T22:02:41.937249Z","end":"2026-03-08T22:02:42.102777Z","steps":["trace[1641865577] 'agreement among raft nodes before linearized reading' (duration: 165.496097ms)"],"step_count":1} 2026-03-08T22:02:42.102849780Z {"level":"info","ts":"2026-03-08T22:02:42.102837Z","caller":"traceutil/trace.go:171","msg":"trace[42294095] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-network; range_end:; response_count:1; response_revision:10791; }","duration":"189.647291ms","start":"2026-03-08T22:02:41.913186Z","end":"2026-03-08T22:02:42.102833Z","steps":["trace[42294095] 'agreement among raft nodes before linearized reading' (duration: 189.60577ms)"],"step_count":1} 2026-03-08T22:02:42.102969553Z {"level":"warn","ts":"2026-03-08T22:02:42.102932Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"214.919604ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-cluster-machine-approver/machine-approver-sa\" ","response":"range_response_count:1 size:1479"} 2026-03-08T22:02:42.103020814Z {"level":"info","ts":"2026-03-08T22:02:42.102989Z","caller":"traceutil/trace.go:171","msg":"trace[1219853761] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-cluster-machine-approver/machine-approver-sa; range_end:; response_count:1; response_revision:10791; }","duration":"215.029816ms","start":"2026-03-08T22:02:41.887923Z","end":"2026-03-08T22:02:42.102953Z","steps":["trace[1219853761] 'agreement among raft nodes before linearized reading' (duration: 214.212875ms)"],"step_count":1} 2026-03-08T22:02:42.103020814Z {"level":"warn","ts":"2026-03-08T22:02:42.102985Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"315.052581ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-cluster-version/cluster-version-operator\" ","response":"range_response_count:1 size:1888"} 2026-03-08T22:02:42.106112394Z {"level":"info","ts":"2026-03-08T22:02:42.103144Z","caller":"traceutil/trace.go:171","msg":"trace[1754869873] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-cluster-version/cluster-version-operator; range_end:; response_count:1; response_revision:10791; }","duration":"315.961955ms","start":"2026-03-08T22:02:41.787050Z","end":"2026-03-08T22:02:42.103012Z","steps":["trace[1754869873] 'agreement among raft nodes before linearized reading' (duration: 315.087322ms)"],"step_count":1} 2026-03-08T22:02:42.106112394Z {"level":"warn","ts":"2026-03-08T22:02:42.103272Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"388.810577ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-image-registry/prometheus-k8s\" ","response":"range_response_count:1 size:1153"} 2026-03-08T22:02:42.106112394Z {"level":"warn","ts":"2026-03-08T22:02:42.103290Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-08T22:02:41.787030Z","time spent":"316.141259ms","remote":"[::1]:39816","response type":"/etcdserverpb.KV/Range","request count":0,"request size":105,"response count":1,"response size":1912,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-cluster-version/cluster-version-operator\" "} 2026-03-08T22:02:42.106112394Z {"level":"info","ts":"2026-03-08T22:02:42.103325Z","caller":"traceutil/trace.go:171","msg":"trace[162070912] range","detail":"{range_begin:/kubernetes.io/roles/openshift-image-registry/prometheus-k8s; range_end:; response_count:1; response_revision:10791; }","duration":"388.864928ms","start":"2026-03-08T22:02:41.714445Z","end":"2026-03-08T22:02:42.103310Z","steps":["trace[162070912] 'agreement among raft nodes before linearized reading' (duration: 387.697588ms)"],"step_count":1} 2026-03-08T22:02:42.106112394Z {"level":"warn","ts":"2026-03-08T22:02:42.103366Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-08T22:02:41.714363Z","time spent":"388.993831ms","remote":"[::1]:36070","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":1177,"request content":"key:\"/kubernetes.io/roles/openshift-image-registry/prometheus-k8s\" "} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715153371026023125 0ustar00000000000000002026-03-08T21:58:49.182515831Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-6bf768964c-srxfg/oauth-apiserver_current.log0000640000000000000000000011516215153371026031417 0ustar00000000000000002026-03-08T22:00:44.987134840Z E0308 22:00:44.987005 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:00:44.987179341Z E0308 22:00:44.987099 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:00:45.038728404Z E0308 22:00:45.038673 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:00:45.056141123Z E0308 22:00:45.053212 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:00:45.063838993Z E0308 22:00:45.063797 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:00:45.071636344Z E0308 22:00:45.071610 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:00:45.144035965Z E0308 22:00:45.143965 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:00:45.151046006Z E0308 22:00:45.151019 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.678632428Z E0308 22:01:09.678501 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.679024198Z E0308 22:01:09.678980 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.679241043Z E0308 22:01:09.679182 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.679312766Z E0308 22:01:09.679277 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.679647345Z E0308 22:01:09.679514 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.679647345Z E0308 22:01:09.679574 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.679675095Z E0308 22:01:09.679638 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.679763297Z E0308 22:01:09.679724 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.679981563Z E0308 22:01:09.679212 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:09.680007004Z E0308 22:01:09.679988 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.971157385Z E0308 22:01:14.970409 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.971430782Z E0308 22:01:14.971231 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.974635565Z E0308 22:01:14.971703 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.974635565Z E0308 22:01:14.972176 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.974635565Z E0308 22:01:14.972652 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.985274909Z E0308 22:01:14.985217 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.985415613Z E0308 22:01:14.985388 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.985622908Z E0308 22:01:14.985562 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.985622908Z E0308 22:01:14.985576 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:14.985889576Z E0308 22:01:14.985844 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688502179Z E0308 22:01:39.687941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688502179Z E0308 22:01:39.688094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688502179Z E0308 22:01:39.688175 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688502179Z E0308 22:01:39.688384 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688502179Z E0308 22:01:39.688447 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688502179Z E0308 22:01:39.688461 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688602823Z E0308 22:01:39.688573 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688645834Z E0308 22:01:39.688391 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688784667Z E0308 22:01:39.688573 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:39.688901450Z E0308 22:01:39.688109 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.973815939Z E0308 22:01:44.973756 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.973956812Z E0308 22:01:44.973908 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.975171524Z E0308 22:01:44.974160 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.975862032Z E0308 22:01:44.975830 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.976361185Z E0308 22:01:44.976248 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.982276647Z E0308 22:01:44.982239 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.982308228Z E0308 22:01:44.982273 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.982345279Z E0308 22:01:44.982240 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.982544335Z E0308 22:01:44.982513 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:44.982589636Z E0308 22:01:44.982551 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:45.044292030Z E0308 22:01:45.043383 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:45.044292030Z E0308 22:01:45.043719 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:45.056843305Z E0308 22:01:45.056794 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:01:45.057158183Z E0308 22:01:45.056863 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:06.146153633Z I0308 22:02:06.142893 1 policy_source.go:224] refreshing policies 2026-03-08T22:02:09.698457013Z E0308 22:02:09.698406 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.698580196Z E0308 22:02:09.698542 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.698802722Z E0308 22:02:09.698774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.698899714Z E0308 22:02:09.698467 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.699093229Z E0308 22:02:09.699046 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.699140610Z E0308 22:02:09.699105 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.699300355Z E0308 22:02:09.699272 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.699386898Z E0308 22:02:09.699371 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.699439699Z E0308 22:02:09.699413 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:09.699450789Z E0308 22:02:09.699433 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:11.161287103Z I0308 22:02:11.161056 1 policy_source.go:224] refreshing policies 2026-03-08T22:02:11.180243382Z I0308 22:02:11.179645 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-08T22:02:11.181574616Z I0308 22:02:11.181526 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-08T22:02:14.954822376Z E0308 22:02:14.954102 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.954822376Z E0308 22:02:14.954670 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.960778800Z E0308 22:02:14.960719 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.961044347Z E0308 22:02:14.961018 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.961824237Z E0308 22:02:14.961570 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.964102076Z E0308 22:02:14.964000 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.964964348Z E0308 22:02:14.964646 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.965544403Z E0308 22:02:14.965490 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.965977574Z E0308 22:02:14.965821 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:14.967694248Z E0308 22:02:14.967644 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.715283835Z E0308 22:02:39.714300 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.715283835Z E0308 22:02:39.714620 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.715283835Z E0308 22:02:39.715004 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.715420449Z E0308 22:02:39.715373 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.715532253Z E0308 22:02:39.715489 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.715805979Z E0308 22:02:39.715748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.716052036Z E0308 22:02:39.716001 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.716380814Z E0308 22:02:39.716340 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.716612250Z E0308 22:02:39.716556 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:39.716869746Z E0308 22:02:39.716814 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.944307492Z E0308 22:02:44.943877 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.944748983Z E0308 22:02:44.944428 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.944796714Z E0308 22:02:44.944777 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.945324308Z E0308 22:02:44.945134 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.945528833Z E0308 22:02:44.945497 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.965340565Z E0308 22:02:44.965271 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.966059204Z E0308 22:02:44.965787 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.966253329Z E0308 22:02:44.966199 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.966280760Z E0308 22:02:44.966231 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:44.968243750Z E0308 22:02:44.966900 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.047342315Z E0308 22:02:45.047247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.058846312Z E0308 22:02:45.058198 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.086251419Z E0308 22:02:45.085669 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" 2026-03-08T22:02:45.097316905Z E0308 22:02:45.095709 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7079361966339577082, SKID=E8:E0:C8:C2:62:7B:CB:DA:D0:F4:01:08:36:FC:E2:9B:4D:56:42:5E, AKID=29:12:5D:3D:99:8E:FC:9C:67:A5:74:61:48:FC:AD:4E:10:A4:51:92 failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/logs/router-default-79f8cd6fdd-4fsdl/router_current.log0000640000000000000000000002376615153371026027232 0ustar00000000000000002026-03-08T22:02:21.501967501Z [-]has-synced failed: Router not synced 2026-03-08T22:02:22.502649798Z I0308 22:02:22.502582 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:22.502649798Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:22.502649798Z [-]has-synced failed: Router not synced 2026-03-08T22:02:23.503417658Z I0308 22:02:23.503337 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:23.503417658Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:23.503417658Z [-]has-synced failed: Router not synced 2026-03-08T22:02:24.504436674Z I0308 22:02:24.504342 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:24.504436674Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:24.504436674Z [-]has-synced failed: Router not synced 2026-03-08T22:02:25.502300118Z I0308 22:02:25.502234 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:25.502300118Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:25.502300118Z [-]has-synced failed: Router not synced 2026-03-08T22:02:26.503479918Z I0308 22:02:26.503257 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:26.503479918Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:26.503479918Z [-]has-synced failed: Router not synced 2026-03-08T22:02:27.504311279Z I0308 22:02:27.503876 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:27.504311279Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:27.504311279Z [-]has-synced failed: Router not synced 2026-03-08T22:02:27.594009467Z W0308 22:02:27.593952 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T22:02:27.594108939Z E0308 22:02:27.594093 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T22:02:28.502405279Z I0308 22:02:28.502362 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:28.502405279Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:28.502405279Z [-]has-synced failed: Router not synced 2026-03-08T22:02:29.504511443Z I0308 22:02:29.503127 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:29.504511443Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:29.504511443Z [-]has-synced failed: Router not synced 2026-03-08T22:02:30.502866671Z I0308 22:02:30.502748 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:30.502866671Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:30.502866671Z [-]has-synced failed: Router not synced 2026-03-08T22:02:31.503884117Z I0308 22:02:31.503782 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:31.503884117Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:31.503884117Z [-]has-synced failed: Router not synced 2026-03-08T22:02:32.503831005Z I0308 22:02:32.503713 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:32.503831005Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:32.503831005Z [-]has-synced failed: Router not synced 2026-03-08T22:02:33.503566247Z I0308 22:02:33.502335 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:33.503566247Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:33.503566247Z [-]has-synced failed: Router not synced 2026-03-08T22:02:34.502573751Z I0308 22:02:34.502519 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:34.502573751Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:34.502573751Z [-]has-synced failed: Router not synced 2026-03-08T22:02:35.503619368Z I0308 22:02:35.503503 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:35.503619368Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:35.503619368Z [-]has-synced failed: Router not synced 2026-03-08T22:02:36.503855844Z I0308 22:02:36.503747 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:36.503855844Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:36.503855844Z [-]has-synced failed: Router not synced 2026-03-08T22:02:36.521719915Z W0308 22:02:36.521665 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T22:02:36.521719915Z E0308 22:02:36.521710 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T22:02:37.503560486Z I0308 22:02:37.503428 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:37.503560486Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:37.503560486Z [-]has-synced failed: Router not synced 2026-03-08T22:02:38.502532038Z I0308 22:02:38.502423 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:38.502532038Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:38.502532038Z [-]has-synced failed: Router not synced 2026-03-08T22:02:39.503222347Z I0308 22:02:39.503110 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:39.503222347Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:39.503222347Z [-]has-synced failed: Router not synced 2026-03-08T22:02:40.503375479Z I0308 22:02:40.503277 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:40.503375479Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:40.503375479Z [-]has-synced failed: Router not synced 2026-03-08T22:02:41.502693461Z I0308 22:02:41.502571 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:41.502693461Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:41.502693461Z [-]has-synced failed: Router not synced 2026-03-08T22:02:42.503359009Z I0308 22:02:42.503280 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:42.503359009Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:42.503359009Z [-]has-synced failed: Router not synced 2026-03-08T22:02:43.502887086Z I0308 22:02:43.502819 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:43.502887086Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:43.502887086Z [-]has-synced failed: Router not synced 2026-03-08T22:02:44.505454012Z I0308 22:02:44.504521 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:44.505454012Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:44.505454012Z [-]has-synced failed: Router not synced 2026-03-08T22:02:45.502468235Z I0308 22:02:45.502365 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:45.502468235Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:45.502468235Z [-]has-synced failed: Router not synced 2026-03-08T22:02:46.503256564Z I0308 22:02:46.503054 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:46.503256564Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:46.503256564Z [-]has-synced failed: Router not synced 2026-03-08T22:02:47.503549042Z I0308 22:02:47.503454 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:47.503549042Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:47.503549042Z [-]has-synced failed: Router not synced 2026-03-08T22:02:48.504358772Z I0308 22:02:48.504223 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:48.504358772Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:48.504358772Z [-]has-synced failed: Router not synced 2026-03-08T22:02:49.503500419Z I0308 22:02:49.503431 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:49.503500419Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:49.503500419Z [-]has-synced failed: Router not synced 2026-03-08T22:02:50.320244674Z W0308 22:02:50.320158 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T22:02:50.320244674Z E0308 22:02:50.320205 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-08T22:02:50.501875027Z I0308 22:02:50.501800 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:50.501875027Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:50.501875027Z [-]has-synced failed: Router not synced 2026-03-08T22:02:51.504025923Z I0308 22:02:51.503908 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:51.504025923Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:51.504025923Z [-]has-synced failed: Router not synced 2026-03-08T22:02:52.502684737Z I0308 22:02:52.502586 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-08T22:02:52.502684737Z [-]backend-http failed: backend reported failure 2026-03-08T22:02:52.502684737Z [-]has-synced failed: Router not synced authentication-operator_current.log0000640000000000000000000003127115153371026037310 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-8h8fx2026-03-08T22:00:11.609335606Z Copying system trust bundle 2026-03-08T22:00:11.703422807Z W0308 22:00:11.703260 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-08T22:00:11.703856239Z I0308 22:00:11.703776 1 observer_polling.go:159] Starting file observer 2026-03-08T22:00:11.704508905Z I0308 22:00:11.704451 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-08T22:00:11.704567246Z I0308 22:00:11.704516 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-08T22:00:11.705180993Z I0308 22:00:11.705131 1 observer_polling.go:159] Starting file observer 2026-03-08T22:01:11.718053506Z W0308 22:01:11.717900 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-7c6989d6c4-8h8fx) 2026-03-08T22:01:11.718923468Z I0308 22:01:11.718877 1 builder.go:304] cluster-authentication-operator version - 2026-03-08T22:01:11.720854959Z I0308 22:01:11.720755 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T22:01:29.260673758Z I0308 22:01:29.260473 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-08T22:01:29.267835593Z I0308 22:01:29.267741 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-08T22:01:29.267835593Z I0308 22:01:29.267783 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-08T22:01:29.267835593Z I0308 22:01:29.267819 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-08T22:01:29.267893715Z I0308 22:01:29.267831 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-08T22:01:29.284479293Z I0308 22:01:29.284374 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-08T22:01:29.284479293Z I0308 22:01:29.284399 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-08T22:01:29.284479293Z W0308 22:01:29.284434 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:29.284479293Z W0308 22:01:29.284444 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-08T22:01:29.284479293Z W0308 22:01:29.284453 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-08T22:01:29.284479293Z W0308 22:01:29.284462 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-08T22:01:29.284479293Z W0308 22:01:29.284470 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-08T22:01:29.284555265Z W0308 22:01:29.284476 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-08T22:01:29.290414736Z I0308 22:01:29.290339 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773007054\" (2026-03-08 21:57:35 +0000 UTC to 2028-03-07 21:57:36 +0000 UTC (now=2026-03-08 22:01:29.290298603 +0000 UTC))" 2026-03-08T22:01:29.290512159Z I0308 22:01:29.290454 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773007272\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773007272\" (2026-03-08 21:01:11 +0000 UTC to 2027-03-08 21:01:11 +0000 UTC (now=2026-03-08 22:01:29.290434147 +0000 UTC))" 2026-03-08T22:01:29.290512159Z I0308 22:01:29.290491 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-08T22:01:29.290551930Z I0308 22:01:29.290522 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-08T22:01:29.290887828Z I0308 22:01:29.290825 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-08T22:01:29.291155146Z I0308 22:01:29.291067 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-08T22:01:29.291226428Z I0308 22:01:29.291184 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-08T22:01:29.291283339Z I0308 22:01:29.291231 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-08T22:01:29.291601957Z I0308 22:01:29.291154 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-08T22:01:29.291674649Z I0308 22:01:29.291633 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-08T22:01:29.291674649Z I0308 22:01:29.291667 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:29.291715460Z I0308 22:01:29.291696 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:01:29.291848293Z I0308 22:01:29.291812 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-08T22:01:29.292063799Z I0308 22:01:29.292016 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-08T22:01:29.292063799Z I0308 22:01:29.292035 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-08T22:01:29.292217783Z I0308 22:01:29.292164 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-03-08T22:01:29.294638156Z I0308 22:01:29.294578 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-08T22:01:29.295065056Z I0308 22:01:29.295005 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-08T22:01:29.295401026Z I0308 22:01:29.295369 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-08T22:01:29.392195807Z I0308 22:01:29.392027 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-08T22:01:29.392195807Z I0308 22:01:29.392138 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-08T22:01:29.392521555Z I0308 22:01:29.392448 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-08 21:47:38 +0000 UTC to 2026-03-09 21:47:38 +0000 UTC (now=2026-03-08 22:01:29.392402392 +0000 UTC))" 2026-03-08T22:01:29.392621608Z I0308 22:01:29.392583 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-08T22:01:29.392786822Z I0308 22:01:29.392749 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773007054\" (2026-03-08 21:57:35 +0000 UTC to 2028-03-07 21:57:36 +0000 UTC (now=2026-03-08 22:01:29.39271684 +0000 UTC))" 2026-03-08T22:01:29.393055878Z I0308 22:01:29.392989 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773007272\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773007272\" (2026-03-08 21:01:11 +0000 UTC to 2027-03-08 21:01:11 +0000 UTC (now=2026-03-08 22:01:29.392964436 +0000 UTC))" 2026-03-08T22:01:29.393303115Z I0308 22:01:29.393222 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 21:40:59 +0000 UTC to 2036-03-05 21:40:59 +0000 UTC (now=2026-03-08 22:01:29.393194382 +0000 UTC))" 2026-03-08T22:01:29.393303115Z I0308 22:01:29.393265 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-08 21:47:40 +0000 UTC to 2026-03-09 21:47:40 +0000 UTC (now=2026-03-08 22:01:29.393243153 +0000 UTC))" 2026-03-08T22:01:29.393303115Z I0308 22:01:29.393294 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-08 21:47:40 +0000 UTC to 2027-03-08 21:47:40 +0000 UTC (now=2026-03-08 22:01:29.393275524 +0000 UTC))" 2026-03-08T22:01:29.393483550Z I0308 22:01:29.393399 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-08 21:47:41 +0000 UTC to 2027-03-08 21:47:41 +0000 UTC (now=2026-03-08 22:01:29.393306266 +0000 UTC))" 2026-03-08T22:01:29.393483550Z I0308 22:01:29.393452 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-08 21:47:38 +0000 UTC to 2036-03-05 21:47:38 +0000 UTC (now=2026-03-08 22:01:29.393432799 +0000 UTC))" 2026-03-08T22:01:29.393504771Z I0308 22:01:29.393492 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-08 21:47:38 +0000 UTC to 2026-03-09 21:47:38 +0000 UTC (now=2026-03-08 22:01:29.39346385 +0000 UTC))" 2026-03-08T22:01:29.393821709Z I0308 22:01:29.393776 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773007054\" (2026-03-08 21:57:35 +0000 UTC to 2028-03-07 21:57:36 +0000 UTC (now=2026-03-08 22:01:29.393749407 +0000 UTC))" 2026-03-08T22:01:29.394037994Z I0308 22:01:29.393999 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773007272\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773007272\" (2026-03-08 21:01:11 +0000 UTC to 2027-03-08 21:01:11 +0000 UTC (now=2026-03-08 22:01:29.393977073 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000004554315153371026037511 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-8h8fx2026-03-08T21:59:37.333981308Z I0308 21:59:37.333945 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionPrune ... 2026-03-08T21:59:37.333981308Z I0308 21:59:37.333960 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionCondition ... 2026-03-08T21:59:37.334000179Z I0308 21:59:37.333989 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-08T21:59:37.334044420Z I0308 21:59:37.334011 1 base_controller.go:181] Shutting down oauth-server ... 2026-03-08T21:59:37.334115592Z I0308 21:59:37.334051 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-08T21:59:37.334196014Z E0308 21:59:37.334150 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io), Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.user.openshift.io\": context canceled]" 2026-03-08T21:59:37.334196014Z I0308 21:59:37.334182 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-08T21:59:37.334261125Z E0308 21:59:37.334234 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://172.30.0.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": context canceled" 2026-03-08T21:59:37.334277526Z I0308 21:59:37.334267 1 base_controller.go:123] Shutting down worker of openshift-authentication-ServiceCA controller ... 2026-03-08T21:59:37.334293457Z I0308 21:59:37.334280 1 base_controller.go:113] All openshift-authentication-ServiceCA workers have been terminated 2026-03-08T21:59:37.334309257Z I0308 21:59:37.334297 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-08T21:59:37.334324788Z I0308 21:59:37.334315 1 base_controller.go:181] Shutting down WebhookAuthenticatorController ... 2026-03-08T21:59:37.335178369Z I0308 21:59:37.335122 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3951421422/tls.crt::/tmp/serving-cert-3951421422/tls.key" 2026-03-08T21:59:37.335783445Z I0308 21:59:37.335742 1 base_controller.go:159] All StatusSyncer_authentication post start hooks have been terminated 2026-03-08T21:59:37.335877227Z I0308 21:59:37.335822 1 base_controller.go:181] Shutting down OpenShiftAuthenticatorCertRequester ... 2026-03-08T21:59:37.335877227Z I0308 21:59:37.335854 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-08T21:59:37.335942439Z I0308 21:59:37.335898 1 base_controller.go:181] Shutting down openshift-authentication-IngressNodesAvailable ... 2026-03-08T21:59:37.335942439Z I0308 21:59:37.335927 1 base_controller.go:181] Shutting down RouterCertsDomainValidationController ... 2026-03-08T21:59:37.336018670Z I0308 21:59:37.335992 1 base_controller.go:181] Shutting down OAuthAPIServerController-WorkloadWorkloadController ... 2026-03-08T21:59:37.336335188Z E0308 21:59:37.336301 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://172.30.0.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": context canceled" 2026-03-08T21:59:37.336432751Z I0308 21:59:37.336406 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-oauth-apiserver ... 2026-03-08T21:59:37.336526253Z I0308 21:59:37.336438 1 base_controller.go:181] Shutting down OpenshiftAuthenticationStaticResources-StaticResources ... 2026-03-08T21:59:37.336596015Z I0308 21:59:37.336573 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionState ... 2026-03-08T21:59:37.336668036Z I0308 21:59:37.336645 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionKey ... 2026-03-08T21:59:37.336749368Z I0308 21:59:37.336727 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-08T21:59:37.336832230Z I0308 21:59:37.336810 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionMigration ... 2026-03-08T21:59:37.336915152Z I0308 21:59:37.336891 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionPrune controller ... 2026-03-08T21:59:37.336989374Z I0308 21:59:37.336967 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionPrune workers have been terminated 2026-03-08T21:59:37.337445867Z I0308 21:59:37.337411 1 base_controller.go:123] Shutting down worker of OAuthAPIServerController-WorkloadWorkloadController controller ... 2026-03-08T21:59:37.337533979Z I0308 21:59:37.337511 1 base_controller.go:113] All OAuthAPIServerController-WorkloadWorkloadController workers have been terminated 2026-03-08T21:59:37.337590620Z I0308 21:59:37.337531 1 base_controller.go:123] Shutting down worker of oauth-server controller ... 2026-03-08T21:59:37.337657232Z I0308 21:59:37.337634 1 base_controller.go:113] All oauth-server workers have been terminated 2026-03-08T21:59:37.337878847Z I0308 21:59:37.337729 1 base_controller.go:181] Shutting down OAuthServerServiceEndpointsEndpointAccessibleController ... 2026-03-08T21:59:37.337878847Z I0308 21:59:37.337766 1 base_controller.go:181] Shutting down TrustDistributionController ... 2026-03-08T21:59:37.337906298Z E0308 21:59:37.337873 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": context canceled" 2026-03-08T21:59:37.337926068Z I0308 21:59:37.337912 1 base_controller.go:181] Shutting down openshift-authentication-IngressState ... 2026-03-08T21:59:37.337945769Z I0308 21:59:37.337934 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointsEndpointAccessibleController controller ... 2026-03-08T21:59:37.337965269Z I0308 21:59:37.337949 1 base_controller.go:113] All OAuthServerServiceEndpointsEndpointAccessibleController workers have been terminated 2026-03-08T21:59:37.338272877Z E0308 21:59:37.338180 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver), \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": context canceled, \"oauth-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:59:37.338360699Z I0308 21:59:37.338305 1 base_controller.go:123] Shutting down worker of authentication-ManagementState controller ... 2026-03-08T21:59:37.338360699Z I0308 21:59:37.338341 1 base_controller.go:113] All authentication-ManagementState workers have been terminated 2026-03-08T21:59:37.338388640Z I0308 21:59:37.338374 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-08T21:59:37.338422141Z I0308 21:59:37.338383 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionKey controller ... 2026-03-08T21:59:37.338422141Z I0308 21:59:37.338384 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionMigration controller ... 2026-03-08T21:59:37.338443791Z I0308 21:59:37.338414 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionKey workers have been terminated 2026-03-08T21:59:37.338443791Z I0308 21:59:37.338427 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionMigration workers have been terminated 2026-03-08T21:59:37.338464802Z I0308 21:59:37.338430 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ... 2026-03-08T21:59:37.338464802Z I0308 21:59:37.338452 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-08T21:59:37.338485333Z I0308 21:59:37.338458 1 base_controller.go:113] All WebhookAuthenticatorCertApprover_OpenShiftAuthenticator workers have been terminated 2026-03-08T21:59:37.338485333Z I0308 21:59:37.338468 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-08T21:59:37.338485333Z I0308 21:59:37.337593 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-08T21:59:37.338507764Z I0308 21:59:37.338417 1 base_controller.go:123] Shutting down worker of openshift-authentication-UnsupportedConfigOverrides controller ... 2026-03-08T21:59:37.338507764Z I0308 21:59:37.338499 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-08T21:59:37.338528084Z I0308 21:59:37.338507 1 base_controller.go:181] Shutting down openshift-authentication-RemoveStaleConditions ... 2026-03-08T21:59:37.338528084Z I0308 21:59:37.338501 1 base_controller.go:113] All openshift-authentication-UnsupportedConfigOverrides workers have been terminated 2026-03-08T21:59:37.338548695Z I0308 21:59:37.338486 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-08T21:59:37.338548695Z E0308 21:59:37.338531 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled" 2026-03-08T21:59:37.338569355Z I0308 21:59:37.338546 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-08T21:59:37.338569355Z I0308 21:59:37.338558 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionState controller ... 2026-03-08T21:59:37.338589826Z I0308 21:59:37.338564 1 base_controller.go:123] Shutting down worker of OpenShiftAuthenticatorCertRequester controller ... 2026-03-08T21:59:37.338589826Z I0308 21:59:37.338574 1 base_controller.go:123] Shutting down worker of openshift-authentication-RemoveStaleConditions controller ... 2026-03-08T21:59:37.338589826Z I0308 21:59:37.338581 1 base_controller.go:113] All OpenShiftAuthenticatorCertRequester workers have been terminated 2026-03-08T21:59:37.338611596Z I0308 21:59:37.338591 1 base_controller.go:113] All openshift-authentication-RemoveStaleConditions workers have been terminated 2026-03-08T21:59:37.338611596Z I0308 21:59:37.338594 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressNodesAvailable controller ... 2026-03-08T21:59:37.338611596Z I0308 21:59:37.338596 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-08T21:59:37.338640737Z I0308 21:59:37.338610 1 base_controller.go:113] All openshift-authentication-IngressNodesAvailable workers have been terminated 2026-03-08T21:59:37.338640737Z I0308 21:59:37.338478 1 base_controller.go:123] Shutting down worker of StatusSyncer_authentication controller ... 2026-03-08T21:59:37.338640737Z I0308 21:59:37.338389 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-08T21:59:37.338663328Z I0308 21:59:37.338633 1 base_controller.go:113] All StatusSyncer_authentication workers have been terminated 2026-03-08T21:59:37.338663328Z I0308 21:59:37.338576 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionState workers have been terminated 2026-03-08T21:59:37.338663328Z I0308 21:59:37.338403 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointAccessibleController controller ... 2026-03-08T21:59:37.338685558Z I0308 21:59:37.338654 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-08T21:59:37.338685558Z I0308 21:59:37.338665 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-08T21:59:37.338685558Z I0308 21:59:37.338669 1 base_controller.go:113] All OAuthServerServiceEndpointAccessibleController workers have been terminated 2026-03-08T21:59:37.341120329Z I0308 21:59:37.337578 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionCondition controller ... 2026-03-08T21:59:37.341120329Z I0308 21:59:37.338684 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-08T21:59:37.341120329Z I0308 21:59:37.338656 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-08T21:59:37.341120329Z I0308 21:59:37.338697 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionCondition workers have been terminated 2026-03-08T21:59:37.341120329Z I0308 21:59:37.338714 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-08T21:59:37.341120329Z I0308 21:59:37.339268 1 base_controller.go:123] Shutting down worker of TrustDistributionController controller ... 2026-03-08T21:59:37.341120329Z I0308 21:59:37.339286 1 base_controller.go:113] All TrustDistributionController workers have been terminated 2026-03-08T21:59:37.341120329Z I0308 21:59:37.339318 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-08T21:59:37.341120329Z I0308 21:59:37.339333 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-08T21:59:37.341120329Z W0308 21:59:37.339400 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-08T21:59:37.341120329Z E0308 21:59:37.339439 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": context canceled" 2026-03-08T21:59:37.341120329Z I0308 21:59:37.339881 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ... 2026-03-08T21:59:37.341120329Z I0308 21:59:37.339906 1 base_controller.go:113] All NamespaceFinalizerController_openshift-oauth-apiserver workers have been terminated 2026-03-08T21:59:37.341120329Z I0308 21:59:37.341097 1 base_controller.go:123] Shutting down worker of RouterCertsDomainValidationController controller ... 2026-03-08T21:59:37.341177470Z I0308 21:59:37.341122 1 base_controller.go:113] All RouterCertsDomainValidationController workers have been terminated 2026-03-08T21:59:37.345141901Z W0308 21:59:37.345098 1 base_controller.go:242] Updating status of "WebhookAuthenticatorController" failed: unable to ApplyStatus for operator using fieldManager "WebhookAuthenticatorController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-08T21:59:37.345259644Z E0308 21:59:37.345235 1 base_controller.go:279] "Unhandled Error" err="WebhookAuthenticatorController reconciliation failed: Get \"https://172.30.0.1:443/apis/config.openshift.io/v1/authentications/cluster\": context canceled" 2026-03-08T21:59:37.346609588Z I0308 21:59:37.346553 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorController controller ... 2026-03-08T21:59:37.346609588Z I0308 21:59:37.346586 1 base_controller.go:113] All WebhookAuthenticatorController workers have been terminated 2026-03-08T21:59:37.422915079Z E0308 21:59:37.422803 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication), \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": context canceled, \"oauth-openshift/serviceaccount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/oauth-service.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-08T21:59:37.424047228Z I0308 21:59:37.423952 1 base_controller.go:123] Shutting down worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2026-03-08T21:59:37.424047228Z I0308 21:59:37.424029 1 base_controller.go:113] All OpenshiftAuthenticationStaticResources-StaticResources workers have been terminated 2026-03-08T21:59:42.331710468Z I0308 21:59:42.331612 1 observer_polling.go:162] Shutting down file observer 2026-03-08T22:00:07.824412495Z I0308 22:00:07.824278 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller. 2026-03-08T22:00:11.336361482Z E0308 22:00:11.336256 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-08T22:00:11.336361482Z W0308 22:00:11.336325 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-8h8fx.json0000640000000000000000000001610315153371026030176 0ustar0000000000000000{"metadata":{"name":"authentication-operator-7c6989d6c4-8h8fx","generateName":"authentication-operator-7c6989d6c4-","namespace":"openshift-authentication-operator","uid":"3f1a7900-a0b2-47fc-b43c-a0a5dee6b657","resourceVersion":"9471","creationTimestamp":"2026-03-08T21:56:09Z","labels":{"app":"authentication-operator","pod-template-hash":"7c6989d6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-7c6989d6c4","uid":"df3498fa-d3f9-4f7e-a4a7-bdefd85a8638","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-96gl4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d3571ade02a7c61123d62c53fda6a57031a52c058c0571759dc09f96b23978f"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.34_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-96gl4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:31Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:31Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-03-08T21:57:18Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-08T22:00:11Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T21:57:31Z","finishedAt":"2026-03-08T22:00:11Z","containerID":"cri-o://a33aa7650397c6fcbc3db8208664515afb6c26ede2b1533a472f078a2d4a0ea4"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","containerID":"cri-o://85d980d0ad1f366d812777a55826b75d7182615f3739f55dd1c63103d4d0380c","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-96gl4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000002754315153371026020652 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:52:27Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:52:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-854648ff6d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:52:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-d64cfc9db to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:52:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-7d9c49f57b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:52:40Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:52:41Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:52:41Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:56:02Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:56:05Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:56:05Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:56:06Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:56:07Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-7d9c49f57b-6q5t2","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:56:08Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-d64cfc9db-xqh7x","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:56:08Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-854648ff6d-x5zxr","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:57:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:57:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:57:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:57:46Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:57:46Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:57:46Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:04Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:04Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:05Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:05Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.23/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:20Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 15.937s (15.937s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:20Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 15.515s (15.515s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:21Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 16.549s (16.549s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:21Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:21Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:21Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:21Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:22Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:22Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:23Z","reason":"LeaderElection","message":"package-server-manager-854648ff6d-x5zxr_4f84a747-9db8-48d1-9601-10715a7f587e became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T21:58:25Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:01:57Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:01:57Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:01:57Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:01:58Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:02:01Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-f988cd549-68kmh","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:02:01Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:02:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-f988cd549 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:02:02Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.68:5443/healthz\": dial tcp 10.128.0.68:5443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:02:02Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.68:5443/healthz\": dial tcp 10.128.0.68:5443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:02:02Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:02:02Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:02:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-08T22:02:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.68/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001213415153371026015440 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:44Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-648655b4b4-k22kr","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-648655b4b4 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:46Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:48Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:51Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6f9445b8fd-w44n6","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:51Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-648655b4b4-k22kr","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6f9445b8fd to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-648655b4b4 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:52Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:57:56Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:04Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" in 7.799s (7.799s including waiting). Image size: 589379637 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:06Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:06Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:08Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-08T21:58:08Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000007765415153371026017313 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:52:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-799b6db4d7 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:52:35Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:56:06Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:56:08Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-799b6db4d7-nqz5k","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.19/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:19Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" in 9.568s (9.568s including waiting). Image size: 512273539 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-nqz5k_48b82d6b-449d-43fe-9d33-d4410727c092 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:41Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:41Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:44Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:57:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:13Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"openshift-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:13Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:14Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:14Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:14Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T21:58:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T22:00:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007154615153371026020207 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:52:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-5c74bfc494 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:52:34Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:56:06Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:56:09Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-5c74bfc494-2mspg","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:18Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" in 9.752s (9.752s including waiting). Image size: 506394574 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-5c74bfc494-2mspg_6d8992ef-fa08-40f1-8cc9-204ad2a408a1 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:48Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:50Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:50Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:56Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:58Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:57:58Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:02Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:04Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:07Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:08Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T21:58:14Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T22:00:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000516015153371026016343 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:57:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:57:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:57:57Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:57:57Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:01Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:05Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:06Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:11Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:21Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-08T21:58:21Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012456715153371026022026 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:52:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-86d7cdfdfb to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:52:34Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:56:05Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:56:07Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-86d7cdfdfb-8pqc2","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:18Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" in 9.629s (9.629s including waiting). Image size: 508888174 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-8pqc2_75b5577c-e697-4c72-ad61-10ae1dae25ee became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-qgpxj\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-qgpxj\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:42Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:43Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:45Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:47Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:48Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:49Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:49Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:50Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:53Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:57:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:00Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.10:59951-\u003e172.30.0.10:53: read: connection refused\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.10:59951-\u003e172.30.0.10:53: read: connection refused\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:04Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:05Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:05Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:06Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:06Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:06Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:07Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:08Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:10Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:19Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:20Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:21Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:22Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:26Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T21:58:27Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T22:00:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000224015153371026020154 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T21:58:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T21:58:11Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T21:58:12Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T21:58:12Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T21:58:24Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-08T21:58:27Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.59/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215153371026016363 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-08T21:58:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.50/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-08T21:58:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-08T21:58:21Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-08T21:58:21Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000017114215153371026020222 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:52:39Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-68bd585b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:52:41Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:56:05Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:56:07Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-68bd585b-mww2c","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.14/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:19Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:19Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"LeaderElection","message":"kube-apiserver-operator-68bd585b-mww2c_e6f5f1ad-c607-4169-bb64-a0c573bf5539 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:20Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:21Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"),Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \"),Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:23Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:23Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:23Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:23Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:24Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:24Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:24Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:25Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:25Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:25Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:26Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:26Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:26Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:26Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:27Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:27Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:27Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:27Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:29Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:29Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:30Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:30Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:30Z","reason":"SecretCreateFailed","message":"Failed to create Secret/bound-service-account-signing-key -n openshift-kube-apiserver: secrets \"bound-service-account-signing-key\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:30Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:30Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:30Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:31Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:31Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:31Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:41Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:45Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:47Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:47Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver: configmaps \"kubelet-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:50Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nResourceSyncControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nResourceSyncControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" already exists\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:56Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:57:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:02Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:05Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:12Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T21:58:15Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T22:00:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615153371026014363 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:57:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:57:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.37/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:57:57Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:57:57Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:58:27Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:58:48Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:58:49Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:58:49Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:59:03Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:59:03Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:59:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:59:17Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:59:17Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T21:59:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:21Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:21Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:21Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:21Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:21Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:21Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:22Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:22Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:22Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:22Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-08T22:00:22Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003423515153371026016216 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:52:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-5884b9cd56 to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:52:37Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:56:05Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:56:07Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-5884b9cd56-bh88w","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:18Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" in 9.677s (9.677s including waiting). Image size: 518384455 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"LeaderElection","message":"etcd-operator-5884b9cd56-bh88w_4a63bd89-05d6-4579-92b7-70dab698e421 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nNodeControllerDegraded: All master nodes are ready\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:35Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T21:57:45Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T22:00:38Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T22:00:38Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T22:00:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-08T22:00:42Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000410615153371026016556 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:57:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:57:58Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:57:58Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6bf768964c-srxfg","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:57:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6bf768964c to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:58:04Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" in 5.813s (5.813s including waiting). Image size: 505344964 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-08T21:58:05Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000333215153371026015112 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T21:57:58Z","reason":"SuccessfulCreate","message":"Created pod: router-default-79f8cd6fdd-4fsdl","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T21:57:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-79f8cd6fdd to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T22:02:15Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T22:02:18Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032\" in 2.763s (2.763s including waiting). Image size: 487151732 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T22:02:18Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T22:02:18Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T22:02:28Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-08T22:02:29Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000024027015153371026020314 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:52:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-7c6989d6c4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:52:38Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:56:06Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:56:09Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-7c6989d6c4-8h8fx","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:19Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" in 9.501s (9.501s including waiting). Image size: 513220825 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:32Z","reason":"LeaderElection","message":"authentication-operator-7c6989d6c4-8h8fx_8073d1af-01b2-43bd-a7b9-44216014e240 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"),Available changed from Unknown to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:33Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-6qnt8\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-6qnt8\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:40Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:42Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:43Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:43Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:44Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:46Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:48Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:49Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"SecretCreateFailed","message":"Failed to create Secret/etcd-client -n openshift-oauth-apiserver: secrets \"etcd-client\" already exists","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:52Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:54Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:58Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:57:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:04Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:05Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:05Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:05Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:08Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:08Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:08Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:08Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"oauth-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:58:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.131.244:443/healthz\\\": dial tcp 172.30.131.244:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:59:57Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T21:59:57Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T22:00:07Z","reason":"Killing","message":"Container authentication-operator failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T22:00:11Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T22:00:11Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-08T22:00:11Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015153371026016273 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-08T21:57:59Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-08T21:57:59Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003543715153371021014612 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":345,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1},{"name":"telemeter-client","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015153371020014070 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000003652015153371005014537 0ustar0000000000000000Mar 08 22:01:33.993300 master-0 kubenswrapper[7480]: I0308 22:01:33.993208 7480 patch_prober.go:28] interesting pod/controller-manager-f7df5f5b-txsrq container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.48:8443/healthz\": dial tcp 10.128.0.48:8443: connect: connection refused" start-of-body= Mar 08 22:01:33.993300 master-0 kubenswrapper[7480]: I0308 22:01:33.993298 7480 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-f7df5f5b-txsrq" podUID="2395900a-ff6b-46ff-92c6-a8a1b5675b67" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.48:8443/healthz\": dial tcp 10.128.0.48:8443: connect: connection refused" Mar 08 22:01:33.993659 master-0 kubenswrapper[7480]: I0308 22:01:33.993204 7480 patch_prober.go:28] interesting pod/controller-manager-f7df5f5b-txsrq container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.48:8443/healthz\": dial tcp 10.128.0.48:8443: connect: connection refused" start-of-body= Mar 08 22:01:33.993659 master-0 kubenswrapper[7480]: I0308 22:01:33.993385 7480 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-f7df5f5b-txsrq" podUID="2395900a-ff6b-46ff-92c6-a8a1b5675b67" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.48:8443/healthz\": dial tcp 10.128.0.48:8443: connect: connection refused" Mar 08 22:01:36.636266 master-0 kubenswrapper[7480]: I0308 22:01:36.636185 7480 patch_prober.go:28] interesting pod/marketplace-operator-64bf9778cb-5ljhh container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.25:8080/healthz\": dial tcp 10.128.0.25:8080: connect: connection refused" start-of-body= Mar 08 22:01:36.637175 master-0 kubenswrapper[7480]: I0308 22:01:36.636296 7480 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-64bf9778cb-5ljhh" podUID="7e0267ba-5dd7-4e81-885f-95b27a7b42ea" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.25:8080/healthz\": dial tcp 10.128.0.25:8080: connect: connection refused" Mar 08 22:01:39.316475 master-0 kubenswrapper[7480]: E0308 22:01:39.316433 7480 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="23.452s" Mar 08 22:01:39.593655 master-0 kubenswrapper[7480]: E0308 22:01:39.593628 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"a38551dfdc41a69ef8701c103d6e1d1e4d82312c574f00743d9049e10be45331\": container with ID starting with a38551dfdc41a69ef8701c103d6e1d1e4d82312c574f00743d9049e10be45331 not found: ID does not exist" containerID="a38551dfdc41a69ef8701c103d6e1d1e4d82312c574f00743d9049e10be45331" Mar 08 22:01:39.593746 master-0 kubenswrapper[7480]: E0308 22:01:39.593708 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"6b2d935675401022d0d3a5a0cba88a9960e98d4a712ee887558cdfed52b47cbb\": container with ID starting with 6b2d935675401022d0d3a5a0cba88a9960e98d4a712ee887558cdfed52b47cbb not found: ID does not exist" containerID="6b2d935675401022d0d3a5a0cba88a9960e98d4a712ee887558cdfed52b47cbb" Mar 08 22:01:39.631234 master-0 kubenswrapper[7480]: I0308 22:01:39.629960 7480 patch_prober.go:28] interesting pod/marketplace-operator-64bf9778cb-5ljhh container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.25:8080/healthz\": dial tcp 10.128.0.25:8080: connect: connection refused" start-of-body= Mar 08 22:01:39.631234 master-0 kubenswrapper[7480]: I0308 22:01:39.630064 7480 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-64bf9778cb-5ljhh" podUID="7e0267ba-5dd7-4e81-885f-95b27a7b42ea" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.25:8080/healthz\": dial tcp 10.128.0.25:8080: connect: connection refused" Mar 08 22:01:45.144532 master-0 kubenswrapper[7480]: E0308 22:01:45.144515 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="57a34dbc-eb6d-44f5-b1aa-4762b69382ed" containerName="installer" Mar 08 22:01:45.144664 master-0 kubenswrapper[7480]: E0308 22:01:45.144654 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="18d5d11d-3d01-448f-b34e-55ebc772f5e8" containerName="extract-content" Mar 08 22:01:45.144834 master-0 kubenswrapper[7480]: E0308 22:01:45.144797 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c633355a-b323-4458-8ecb-1e490d115f59" containerName="installer" Mar 08 22:01:45.145015 master-0 kubenswrapper[7480]: E0308 22:01:45.145004 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="147f99a4-5e8d-4d76-9c13-3ec3ef6d04a0" containerName="installer" Mar 08 22:01:45.145158 master-0 kubenswrapper[7480]: E0308 22:01:45.145148 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="65148321-8caf-4e9c-80cc-ced8e2a8ac03" containerName="installer" Mar 08 22:01:45.145272 master-0 kubenswrapper[7480]: E0308 22:01:45.145262 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="8a9c4d25-8230-4111-b1ad-fd6427c16488" containerName="installer" Mar 08 22:01:45.145386 master-0 kubenswrapper[7480]: E0308 22:01:45.145376 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="78dc543f-66ed-4098-b5a9-699ec2ccc856" containerName="installer" Mar 08 22:01:45.145579 master-0 kubenswrapper[7480]: E0308 22:01:45.145568 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="18d5d11d-3d01-448f-b34e-55ebc772f5e8" containerName="extract-utilities" Mar 08 22:01:45.193440 master-0 kubenswrapper[7480]: E0308 22:01:45.193399 7480 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = container is not created or running: checking if PID of f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208 is running failed: container process not found" containerID="f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208" cmd=["grpc_health_probe","-addr=:50051"] Mar 08 22:01:45.193988 master-0 kubenswrapper[7480]: E0308 22:01:45.193822 7480 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = container is not created or running: checking if PID of f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208 is running failed: container process not found" containerID="f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208" cmd=["grpc_health_probe","-addr=:50051"] Mar 08 22:01:45.194134 master-0 kubenswrapper[7480]: E0308 22:01:45.194047 7480 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = container is not created or running: checking if PID of f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208 is running failed: container process not found" containerID="f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208" cmd=["grpc_health_probe","-addr=:50051"] Mar 08 22:01:45.194177 master-0 kubenswrapper[7480]: E0308 22:01:45.194120 7480 prober.go:104] "Probe errored" err="rpc error: code = NotFound desc = container is not created or running: checking if PID of f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208 is running failed: container process not found" probeType="Readiness" pod="openshift-marketplace/redhat-marketplace-jcrxj" podUID="74d0aed3-8d57-472f-a48a-14ac41d6575f" containerName="registry-server" Mar 08 22:01:46.493799 master-0 kubenswrapper[7480]: E0308 22:01:46.493762 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"a11dab37eb99c92f50fc6c3697f2813ade902caf47e720efac87404523695ca4\": container with ID starting with a11dab37eb99c92f50fc6c3697f2813ade902caf47e720efac87404523695ca4 not found: ID does not exist" containerID="a11dab37eb99c92f50fc6c3697f2813ade902caf47e720efac87404523695ca4" Mar 08 22:01:46.494302 master-0 kubenswrapper[7480]: E0308 22:01:46.494272 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"4b903d630ebf81f5dffddee24eda4248e8e68dec99aefe9ac560a5898194ece7\": container with ID starting with 4b903d630ebf81f5dffddee24eda4248e8e68dec99aefe9ac560a5898194ece7 not found: ID does not exist" containerID="4b903d630ebf81f5dffddee24eda4248e8e68dec99aefe9ac560a5898194ece7" Mar 08 22:01:46.494638 master-0 kubenswrapper[7480]: E0308 22:01:46.494613 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f8bc6fe2b253e5b908b6548f58ddfca4458e0821748497845d3b3791b01ac875\": container with ID starting with f8bc6fe2b253e5b908b6548f58ddfca4458e0821748497845d3b3791b01ac875 not found: ID does not exist" containerID="f8bc6fe2b253e5b908b6548f58ddfca4458e0821748497845d3b3791b01ac875" Mar 08 22:01:46.677369 master-0 kubenswrapper[7480]: E0308 22:01:46.677335 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208\": container with ID starting with f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208 not found: ID does not exist" containerID="f2c2d966fd4f6b730c5c219486608abd030c709bf059312e195d57c0e217c208" Mar 08 22:01:46.677897 master-0 kubenswrapper[7480]: E0308 22:01:46.677869 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"2f1e10a332985e99999de49aecb019410671810760e55209e6a0bc38dd85a256\": container with ID starting with 2f1e10a332985e99999de49aecb019410671810760e55209e6a0bc38dd85a256 not found: ID does not exist" containerID="2f1e10a332985e99999de49aecb019410671810760e55209e6a0bc38dd85a256" Mar 08 22:01:46.678267 master-0 kubenswrapper[7480]: E0308 22:01:46.678234 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"6eef060b6b4951a91ab0717958f071e01f90849baa75aac0d8ce23ea70ec907c\": container with ID starting with 6eef060b6b4951a91ab0717958f071e01f90849baa75aac0d8ce23ea70ec907c not found: ID does not exist" containerID="6eef060b6b4951a91ab0717958f071e01f90849baa75aac0d8ce23ea70ec907c" Mar 08 22:02:01.648456 master-0 kubenswrapper[7480]: E0308 22:02:01.648447 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5857b3d0-0865-4ffd-bcc9-3c139c575209" containerName="registry-server" Mar 08 22:02:01.648491 master-0 kubenswrapper[7480]: E0308 22:02:01.648485 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="74d0aed3-8d57-472f-a48a-14ac41d6575f" containerName="extract-utilities" Mar 08 22:02:01.648547 master-0 kubenswrapper[7480]: E0308 22:02:01.648506 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="74d0aed3-8d57-472f-a48a-14ac41d6575f" containerName="extract-content" Mar 08 22:02:01.648547 master-0 kubenswrapper[7480]: E0308 22:02:01.648528 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5857b3d0-0865-4ffd-bcc9-3c139c575209" containerName="extract-utilities" Mar 08 22:02:01.648547 master-0 kubenswrapper[7480]: E0308 22:02:01.648543 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5857b3d0-0865-4ffd-bcc9-3c139c575209" containerName="extract-content" Mar 08 22:02:01.648727 master-0 kubenswrapper[7480]: E0308 22:02:01.648555 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="74d0aed3-8d57-472f-a48a-14ac41d6575f" containerName="registry-server" Mar 08 22:02:02.025315 master-0 kubenswrapper[7480]: E0308 22:02:02.025188 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"b20c11f43ccd9db5da682c3bedb94aac8d3ca9373e24359998912b8b40125418\": container with ID starting with b20c11f43ccd9db5da682c3bedb94aac8d3ca9373e24359998912b8b40125418 not found: ID does not exist" containerID="b20c11f43ccd9db5da682c3bedb94aac8d3ca9373e24359998912b8b40125418" Mar 08 22:02:02.026714 master-0 kubenswrapper[7480]: E0308 22:02:02.025926 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"ad82ee8e15ddd42271a76ddef01cd2ec252bf21267dece8cdc826dbc50b614f7\": container with ID starting with ad82ee8e15ddd42271a76ddef01cd2ec252bf21267dece8cdc826dbc50b614f7 not found: ID does not exist" containerID="ad82ee8e15ddd42271a76ddef01cd2ec252bf21267dece8cdc826dbc50b614f7" Mar 08 22:02:02.026714 master-0 kubenswrapper[7480]: E0308 22:02:02.026422 7480 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e1437f5db69404d802631f01a40eb772816aa23d22b78b82add335d21a0b77ce\": container with ID starting with e1437f5db69404d802631f01a40eb772816aa23d22b78b82add335d21a0b77ce not found: ID does not exist" containerID="e1437f5db69404d802631f01a40eb772816aa23d22b78b82add335d21a0b77ce" Mar 08 22:02:02.053292 master-0 kubenswrapper[7480]: E0308 22:02:02.052024 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2c2c4964-678e-46ac-a500-8efc6b8255d9" containerName="machine-approver-controller" Mar 08 22:02:02.053292 master-0 kubenswrapper[7480]: E0308 22:02:02.052151 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2c2c4964-678e-46ac-a500-8efc6b8255d9" containerName="machine-approver-controller" Mar 08 22:02:02.053292 master-0 kubenswrapper[7480]: E0308 22:02:02.052308 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2c2c4964-678e-46ac-a500-8efc6b8255d9" containerName="kube-rbac-proxy" Mar 08 22:02:02.976842 master-0 kubenswrapper[7480]: I0308 22:02:02.976773 7480 patch_prober.go:28] interesting pod/packageserver-f988cd549-68kmh container/packageserver namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.68:5443/healthz\": dial tcp 10.128.0.68:5443: connect: connection refused" start-of-body= Mar 08 22:02:02.976929 master-0 kubenswrapper[7480]: I0308 22:02:02.976841 7480 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/packageserver-f988cd549-68kmh" podUID="4e2eb05c-eaa5-4d9b-abad-c0ef6835087e" containerName="packageserver" probeResult="failure" output="Get \"https://10.128.0.68:5443/healthz\": dial tcp 10.128.0.68:5443: connect: connection refused" Mar 08 22:02:19.416892 master-0 kubenswrapper[7480]: E0308 22:02:19.416857 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5ed9a4ec-9460-4e67-a372-ec6920c54832" containerName="config-sync-controllers" Mar 08 22:02:19.416892 master-0 kubenswrapper[7480]: E0308 22:02:19.416889 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5ed9a4ec-9460-4e67-a372-ec6920c54832" containerName="cluster-cloud-controller-manager" Mar 08 22:02:19.417048 master-0 kubenswrapper[7480]: E0308 22:02:19.416904 7480 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5ed9a4ec-9460-4e67-a372-ec6920c54832" containerName="kube-rbac-proxy"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215153371005020130 0ustar0000000000000000{"unused_machineconfigs_count":21}config/machineconfigs/rendered-worker-2d82b8370516a3b17a9fdc57953c84fa.json0000640000000000000000000004054015153371005023764 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"d4eb710b17481f468c73d93c876a385253a863e0","machineconfiguration.openshift.io/release-image-version":"4.18.34"},"creationTimestamp":"2026-03-08T22:02:20Z","generation":1,"name":"rendered-worker-2d82b8370516a3b17a9fdc57953c84fa","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"d2da1796-1dbd-4b9b-a920-b8e26ba67242"}],"resourceVersion":"10399","uid":"dc715b65-4913-4227-b22d-159bc015912a"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:25968f175e97edd03d85d1cdff3b3d2de25e08c55e75d18285788b825a35e3f3","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1d605384f31a8085f78a96145c2c3dc51afe22721144196140a2699b7c07ebe3 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bfcd8017eede3fb66fa3f5b47c27508b787d38455689154461f0e6a5dc303ff \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:488c7559709f4747b9cc29de1db18038270193dc7acdb546c94a33dc077504e2"}}config/machineconfigs/rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d.json0000640000000000000000000004333015153371005024056 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"d4eb710b17481f468c73d93c876a385253a863e0","machineconfiguration.openshift.io/release-image-version":"4.18.34"},"creationTimestamp":"2026-03-08T22:02:20Z","generation":1,"name":"rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"e988bd5b-35e1-48c0-8293-e1c0814e03b4"}],"resourceVersion":"10400","uid":"743a19a9-183d-4f87-83e6-9dc30ebb3b1b"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:25968f175e97edd03d85d1cdff3b3d2de25e08c55e75d18285788b825a35e3f3","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1d605384f31a8085f78a96145c2c3dc51afe22721144196140a2699b7c07ebe3 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bfcd8017eede3fb66fa3f5b47c27508b787d38455689154461f0e6a5dc303ff \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:488c7559709f4747b9cc29de1db18038270193dc7acdb546c94a33dc077504e2"}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215153371005020174 0ustar0000000000000000[]config/node/master-0.json0000640000000000000000000000676115153371005013767 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"0ddb8058-8075-483a-b934-fc2452244c0b","resourceVersion":"10646","creationTimestamp":"2026-03-08T21:56:06Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d","machineconfiguration.openshift.io/desiredConfig":"rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"10643","machineconfiguration.openshift.io/reason":"missing MachineConfig rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d\nmachineconfig.machineconfiguration.openshift.io \"rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d\" not found","machineconfiguration.openshift.io/state":"Done","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865360Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714384Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-08T22:02:25Z","lastTransitionTime":"2026-03-08T21:56:06Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-08T22:02:25Z","lastTransitionTime":"2026-03-08T21:56:06Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-08T22:02:25Z","lastTransitionTime":"2026-03-08T21:56:06Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-08T22:02:25Z","lastTransitionTime":"2026-03-08T21:57:18Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.111.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602172219-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"runc","features":{"recursiveReadOnlyMounts":true}},{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}}]}}config/clusteroperator/storage.json0000640000000000000000000000346615153371005016312 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"7c7c2a2c-0c15-47d4-af0e-dd5cd73580c0","resourceVersion":"9621","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T22:01:47Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T22:01:47Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T22:01:47Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T22:01:47Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T22:01:47Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315153371005016656 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"a9fd336a-b588-49ad-b53e-0ec6774a5e19","resourceVersion":"4880","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:57:37Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:57:35Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:35Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000307615153371005024663 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"6cae0d8f-1374-42c1-bf70-515d63d73fdf","resourceVersion":"9739","generation":1,"creationTimestamp":"2026-03-08T21:52:10Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:58:22Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T21:58:22Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T22:01:57Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:58:24Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515153371005023454 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"7fce2034-48bc-477b-b785-e052e0e2f90f","resourceVersion":"9175","generation":1,"creationTimestamp":"2026-03-08T21:52:10Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:58:22Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T22:01:27Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:58:22Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:58:22Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115153371005022040 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"bd026fad-f27c-4248-98d1-133d9ee438da","resourceVersion":"8252","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:58:22Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:58:22Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:58:22Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:58:22Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315153371005020302 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"5074c78f-f96e-4f54-8149-f3335f176568","resourceVersion":"829","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215153371005022436 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"8c48b792-8603-4841-a97c-fb3c9c841959","resourceVersion":"7985","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T21:57:37Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 5, desired generation is 6.\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4."},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:58:14Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:37Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215153371005020634 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"35bfeb95-7c64-4e98-98f9-aee4eb219250","resourceVersion":"8068","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:58:13Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T21:57:34Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"openshift-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415153371005015425 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"f793b900-0866-42c4-8ee2-8f8d546b88fa","resourceVersion":"9667","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:51Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:58:16Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:58:16Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:51Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:50Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115153371005017064 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"44290e48-18ab-46b3-bda3-bff4a41ef2d3","resourceVersion":"6513","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.34\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:57:58Z","reason":"AsExpected","message":"Cluster version is \"4.18.34\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:49Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315153371005016335 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"5e84aee6-8d07-44ff-9a26-e3f1e2557dbb","resourceVersion":"6515","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-08T21:56:25Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:56:14Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:56:14Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:57:58Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:57:32Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715153371005017030 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"141f443f-bcc9-4bdf-a241-82a48d08271f","resourceVersion":"6227","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:57Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:57Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:57Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315153371005017125 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"d6100685-0c81-47ab-ac35-464466222efd","resourceVersion":"6378","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.34"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000522515153371005017510 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"0881ef32-194d-4af9-af32-ec82c157dc0e","resourceVersion":"10771","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T22:02:03Z","message":"Working towards 4.18.34"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T22:02:33Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T22:02:20Z","reason":"AsExpected","message":"Cluster has deployed []"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T22:02:20Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-08T22:02:20Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-image","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"master":"all 1 nodes are at latest configuration rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d","worker":"all 0 nodes are at latest configuration rendered-worker-2d82b8370516a3b17a9fdc57953c84fa"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215153371005020077 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"27cdc49d-8175-4d40-840f-42a7a73f2cb4","resourceVersion":"9078","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:58:27Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.34"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:58:27Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:58:27Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:58:27Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415153371005017015 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"2e8351a3-c1c2-44be-a3d7-f81edd637e72","resourceVersion":"10210","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T22:02:15Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T22:02:15Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T22:02:15Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T22:02:15Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315153371005022535 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"594cb992-527c-4c3e-92d7-2779c66fccd6","resourceVersion":"5130","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:57:40Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:57:40Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615153371005017545 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"4db4b230-5479-4290-be16-c709820c2085","resourceVersion":"7645","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T21:57:50Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715153371005021366 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"78707c19-b64c-41bb-8c96-d7b43d976c74","resourceVersion":"8851","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T21:58:08Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:32Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715153371005017573 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"857c01ee-5495-4093-bab4-b9824b8df54a","resourceVersion":"7714","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:21Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T21:58:12Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T21:57:21Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:21Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-08T21:57:21Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534115153371005016470 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"e8b66d69-2977-4791-9185-d6d9f44e0ff7","resourceVersion":"10805","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T22:02:45Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2026-03-08T22:02:45Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T22:02:45Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-08T22:02:45Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T22:02:45Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-03-08T22:02:45Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-03-08T22:02:45Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2026-03-08T22:02:45Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T22:02:45Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000456715153371005016323 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"70cb4f06-fc78-4a8b-b1a7-d4a231822685","resourceVersion":"6547","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:57:59Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T21:57:58Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:59Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:58Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-08T21:57:58Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715153371005017570 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"f74f1f09-a553-4221-aa50-27bbb33fa05c","resourceVersion":"819","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015153371005015562 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"7eda8cb3-d6fb-404b-8c9c-d8f738276dce","resourceVersion":"5710","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T21:57:49Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515153371005015432 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"fb183ec1-4874-4bee-aa55-b6d4ab4fd126","resourceVersion":"8988","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:58:25Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:57:58Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:58:25Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"operator","version":"4.18.34"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715153371005021434 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"b6ab6261-406a-492e-8d1c-039e611f7bc9","resourceVersion":"9551","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:57:40Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:57:40Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"csi-snapshot-controller","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515153371005021613 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"b212ff2a-680d-429f-b4cb-ec3cf2f19374","resourceVersion":"9039","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:58:27Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:58:27Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:58:27Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:58:27Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215153371005016274 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"c72d7e09-598d-4d91-b8a7-6d3c1fc6a8d2","resourceVersion":"799","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615153371005017734 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"55a563fc-73dc-4a65-a1d2-963a2c08a563","resourceVersion":"4734","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:36Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:57:36Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:57:36Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:36Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:36Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015153371005020462 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"e2778846-6d26-487d-a132-b5d51f808c02","resourceVersion":"10211","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T22:01:42Z","reason":"AsExpected","message":"at version 4.18.34"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T22:02:15Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T22:02:15Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T22:01:42Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022415153371005020053 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"72274289-7790-4ee1-948c-4eee3fa7ba8e","resourceVersion":"10311","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T22:01:56Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T22:01:56Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T22:01:56Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T22:01:56Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440215153371005021534 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"51a76f9e-6e49-4af8-b40b-41d1c264281e","resourceVersion":"10083","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-03-08T22:02:08Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-03-08T22:02:08Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-03-08T22:02:08Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-03-08T22:02:08Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T22:02:08Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.34"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T22:02:08Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T22:02:08Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T22:02:08Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015153371005016574 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"d5dbe3a5-7a38-4285-84b4-80b854ccdf66","resourceVersion":"9167","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T22:01:25Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T22:01:25Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T22:01:25Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T22:01:25Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-08T22:01:25Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000773615153371005017671 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"5ea81485-b526-40e7-ad6c-364c41993646","resourceVersion":"7274","generation":1,"creationTimestamp":"2026-03-08T21:52:09Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"AsExpected","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.131.244:443/healthz\": dial tcp 172.30.131.244:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-08T21:58:09Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.131.244:443/healthz\": dial tcp 172.30.131.244:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"oauth-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000001237715153371005015317 0ustar0000000000000000{"images":{"0":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","1":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","10":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","11":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","12":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","13":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","14":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","15":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","16":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","17":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","18":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","19":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","2":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","20":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","21":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","22":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","23":"sha256:243ce0f08a360370edf4960aec94fc6c5be9d4aae26cf8c5320adcd047c1b14f","24":"registry.redhat.io/redhat/community-operator-index:v4.18","25":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","26":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","27":"registry.redhat.io/redhat/certified-operator-index:v4.18","28":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","29":"registry.redhat.io/redhat/redhat-operator-index:v4.18","3":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","30":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","31":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","32":"sha256:3ef4b76f6b989bf3e802d22aff457a019d9c232f0ea8d927ac6ce2d854fe48d7","33":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","34":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","35":"sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032","36":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","37":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","38":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","39":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","4":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","40":"sha256:bc516f6eb3028f5169f1712ac1878d4b591174fd7c363f4ee5aa63162aa01b0e","41":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","42":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","43":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","44":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","45":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","46":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","47":"sha256:bececf32872455775075a3d35100302396ca58ae29827b24d7df086d8ac14432","48":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","49":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","5":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","50":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","51":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","52":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","53":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","54":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","55":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","56":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","57":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","58":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","59":"sha256:3bedf16a5f527126e934c37d2f24886de4a54c9bd9d45b18821d02eefd8b5f9e","6":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","60":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","61":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","62":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","7":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","8":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","9":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},"containers":{"2026-03":{"0":22,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":8,"20":2,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"56":1,"57":1,"58":1,"59":1,"6":4,"60":1,"61":1,"62":1,"7":3,"8":3,"9":2}}}operator-controller-controller-manager-6598bfb6c4-nk294.json0000640000000000000000000002474015153371005032175 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-6598bfb6c4-nk294","generateName":"operator-controller-controller-manager-6598bfb6c4-","namespace":"openshift-operator-controller","uid":"077643a2-ab2d-4f12-9abf-42a1c56d7aff","resourceVersion":"9504","creationTimestamp":"2026-03-08T21:58:00Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"6598bfb6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-6598bfb6c4","uid":"23c56c80-4dbc-48b2-8722-4a3d04409fa7","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-mp26r","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-mp26r","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-mp26r","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:00Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:41Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:41Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:00Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2026-03-08T21:58:00Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-08T21:58:06Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://60d3d202a39452d626dd6317c7caf06c5f21b7e1a289e0984f94bd5f6ec57f48","started":true,"volumeMounts":[{"name":"kube-api-access-mp26r","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-08T22:01:16Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"\"openshift-redhat-marketplace\" reconcileID=\"9ad128fc-863b-421c-8ce2-ed17b7d44e9f\"\nI0308 21:58:16.641200 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"9ad128fc-863b-421c-8ce2-ed17b7d44e9f\"\nI0308 21:58:16.738946 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"6e830f8e-c873-4e9b-935a-549b64ca7d8b\"\nI0308 21:58:16.739007 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"6e830f8e-c873-4e9b-935a-549b64ca7d8b\"\nE0308 21:59:06.229550 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0308 22:00:06.231635 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0308 22:00:19.225150 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0308 22:00:19.225315 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\nI0308 22:00:19.225373 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\n","startedAt":"2026-03-08T21:58:05Z","finishedAt":"2026-03-08T22:00:19Z","containerID":"cri-o://5946b7f2d9d566068ae07c485f39d2cd8eea56a2d551b41eae667da0ce359cfb"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","containerID":"cri-o://a4567b8a512f6afc2a33af0577da173a511b7ea0b98b67a3e548c26a0e448321","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-mp26r","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7c649bf6d4-znt8q.json0000640000000000000000000002515415153371005025514 0ustar0000000000000000{"metadata":{"name":"network-operator-7c649bf6d4-znt8q","generateName":"network-operator-7c649bf6d4-","namespace":"openshift-network-operator","uid":"a21e2296-10cb-4c70-ac3e-2173d35faac4","resourceVersion":"9434","creationTimestamp":"2026-03-08T21:56:08Z","labels":{"name":"network-operator","pod-template-hash":"7c649bf6d4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7c649bf6d4","uid":"7872a395-68ef-4eec-8f04-a1fdf8155b41","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-7xcbb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9242604e78efada5aeb232d73a7963f806b754213f5d92b1dffc9b493d7b5a65"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b19b9d0e5437b0bb19cafc3fb516f654c911cdf11184c0de9a27b43c6b80c9ce"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3aa7c84e73a2a19cc9baca38b7e86dfcde579aa88221647c332c83f047d5ae6d"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5bfe4d3125d98cc501d5a529d3ae2497106a2bbb5a6dd06df7c0e0930d168212"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b62afe74fdcb011a4a8c8fa5572dbab2514dda673ae4be4c6beaef92d28216ba"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7xcbb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:56:14Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:56:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:56:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T21:56:08Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-08T22:00:42Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0308 21:58:53.981196 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI0308 21:58:53.981418 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0308 21:58:53.981502 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI0308 21:58:53.981714 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI0308 21:58:53.981797 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI0308 21:58:53.982044 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0308 21:58:58.966754 1 observer_polling.go:162] Shutting down file observer\nI0308 21:59:23.968342 1 internal.go:550] \"Stopping and waiting for caches\"\nI0308 21:59:23.968402 1 internal.go:554] \"Stopping and waiting for webhooks\"\nI0308 21:59:23.968410 1 internal.go:557] \"Stopping and waiting for HTTP servers\"\nI0308 21:59:23.968427 1 internal.go:561] \"Wait completed, proceeding to shutdown the manager\"\nF0308 21:59:23.968357 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\n","startedAt":"2026-03-08T21:56:13Z","finishedAt":"2026-03-08T21:59:23Z","containerID":"cri-o://33e74f7c7bc9716ac9cd2cfb19a68cc948644c1413dc78e99dffc063fbe5f927"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","containerID":"cri-o://d653a3f99cf80e74726e1b1340ca117861fb6803c0c0eb0b6d0a40207c074c3a","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7xcbb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-trhtl.json0000640000000000000000000002463215153371005026027 0ustar0000000000000000{"metadata":{"name":"network-node-identity-trhtl","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"dfe625a1-5ba4-491f-9ab3-5d91154961a0","resourceVersion":"9454","creationTimestamp":"2026-03-08T21:56:43Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"68cb6fd5b","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"94c6ff8c-179f-4462-8c2b-ba527cecbe52","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-j9c64","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-j9c64","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-j9c64","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:56:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:56:43Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:56:43Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T21:56:43Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-08T22:00:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"\"} reason=\"CSRApproved\"\nI0308 21:57:04.857696 1 approver.go:230] Finished syncing CSR csr-phd6r for master-0 node in 200.929072ms\nI0308 21:57:04.864143 1 approver.go:230] Finished syncing CSR csr-phd6r for unknown node in 209.036µs\nI0308 21:57:05.081591 1 approver.go:230] Finished syncing CSR csr-phd6r for unknown node in 167.294µs\nI0308 21:57:17.061653 1 recorder.go:104] \"CSR \\\"csr-zjqgc\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-zjqgc\"} reason=\"CSRApproved\"\nI0308 21:57:17.071746 1 approver.go:230] Finished syncing CSR csr-zjqgc for master-0 node in 11.835347ms\nI0308 21:57:17.072016 1 approver.go:230] Finished syncing CSR csr-zjqgc for unknown node in 100.042µs\nI0308 21:57:17.083773 1 approver.go:230] Finished syncing CSR csr-zjqgc for unknown node in 202.915µs\nE0308 21:58:53.240364 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0308 21:59:08.240042 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0308 21:59:08.240129 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0308 21:59:23.240709 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0308 21:59:23.240826 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-08T21:56:57Z","finishedAt":"2026-03-08T21:59:23Z","containerID":"cri-o://73a8f9d32fb6d4973561166a1225ead4683b3110d97d82f0bed60b3b5a68361b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://6c17da4a9a78c97b020ed2b0ce3db78d69c06f2bc4329c8df6a1559c497aade3","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-j9c64","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-08T21:56:57Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://d0965a7df17209c3214572f918df6f641eebcced99935a1fa23fd422d4732080","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-j9c64","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215153371005026252 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"d65ccc86-80c9-48b5-b667-cb0cb2353e03","resourceVersion":"3903","creationTimestamp":"2026-03-08T21:56:19Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.mirror":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.seen":"2026-03-08T21:55:33.028607564Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"0ddb8058-8075-483a-b934-fc2452244c0b","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T21:57:30Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-08T21:55:37Z","finishedAt":"2026-03-08T21:55:37Z","containerID":"cri-o://19b1636ab72d9a9b9983713d62f8565fb7c16719c6345915ce9c3d89fbded136"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://19b1636ab72d9a9b9983713d62f8565fb7c16719c6345915ce9c3d89fbded136","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-08T21:56:19Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0308 21:55:52.525709 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0308 21:55:52.525934 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0308 21:55:52.528015 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-08T21:55:52Z","finishedAt":"2026-03-08T21:55:52Z","containerID":"cri-o://f2753c6ede26e51916276b3918863819c08fcf1e3cfeb773ba0609d9fda8556b"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://141c1c193013aba156bcafd70b058b224242057d2cf9f83ba4dd26b8100e4d3f","started":true}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/control-plane-machine-set-operator-6686554ddc-c246n.json0000640000000000000000000001775215153371005027321 0ustar0000000000000000{"metadata":{"name":"control-plane-machine-set-operator-6686554ddc-c246n","generateName":"control-plane-machine-set-operator-6686554ddc-","namespace":"openshift-machine-api","uid":"6eb502a1-db10-46ba-b698-461919464fb9","resourceVersion":"9496","creationTimestamp":"2026-03-08T21:58:19Z","labels":{"k8s-app":"control-plane-machine-set-operator","pod-template-hash":"6686554ddc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.51/23\"],\"mac_address\":\"0a:58:0a:80:00:33\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.51/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.51\"\n ],\n \"mac\": \"0a:58:0a:80:00:33\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"control-plane-machine-set-operator-6686554ddc","uid":"367e27cf-13c5-4edd-95fd-91011f573d6c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"control-plane-machine-set-operator-tls","secret":{"secretName":"control-plane-machine-set-operator-tls","defaultMode":420}},{"name":"kube-api-access-sjlqz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"control-plane-machine-set-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","command":["/manager"],"args":["-v=2","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-machine-api"],"ports":[{"name":"https","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-sjlqz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000490000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"control-plane-machine-set-operator","serviceAccount":"control-plane-machine-set-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c14"},"fsGroup":1000490000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"control-plane-machine-set-operator-dockercfg-j75vf"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:27Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:20Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.51","podIPs":[{"ip":"10.128.0.51"}],"startTime":"2026-03-08T21:58:20Z","containerStatuses":[{"name":"control-plane-machine-set-operator","state":{"running":{"startedAt":"2026-03-08T22:01:39Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ble\" controller=\"controlplanemachineset\" reconcileID=\"27c7f6e5-6a91-4614-9149-fbc8d145c873\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0308 21:58:27.044719 1 controller.go:184] \"Finished reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"27c7f6e5-6a91-4614-9149-fbc8d145c873\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0308 21:58:27.050351 1 controller.go:170] \"Reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"06b5770a-27de-48b2-a3a4-7079d3a96589\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0308 21:58:27.050443 1 controller.go:178] \"No control plane machine set found, setting operator status available\" controller=\"controlplanemachineset\" reconcileID=\"06b5770a-27de-48b2-a3a4-7079d3a96589\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0308 21:58:27.050502 1 controller.go:184] \"Finished reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"06b5770a-27de-48b2-a3a4-7079d3a96589\" namespace=\"openshift-machine-api\" name=\"cluster\"\nE0308 21:59:26.919975 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0308 22:00:26.924014 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/control-plane-machine-set-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io control-plane-machine-set-leader)\nI0308 22:00:39.916504 1 leaderelection.go:297] failed to renew lease openshift-machine-api/control-plane-machine-set-leader: timed out waiting for the condition\nE0308 22:01:13.922262 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nE0308 22:01:13.922404 1 main.go:233] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-08T21:58:26Z","finishedAt":"2026-03-08T22:01:13Z","containerID":"cri-o://8f7cb4c1d4399f77a4bee9272b7411e3d08f666e05ff23bad71da9a5b93158e4"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","containerID":"cri-o://91654533c4587e9af46f22c13f2fb947540ddaf2d482fd744c4652dfb1a9f5a2","started":true,"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-sjlqz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/cluster-baremetal-operator-5cdb4c5598-xwmmm.json0000640000000000000000000002073515153371005026345 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-operator-5cdb4c5598-xwmmm","generateName":"cluster-baremetal-operator-5cdb4c5598-","namespace":"openshift-machine-api","uid":"d9e9c931-9595-42f1-bbc2-c412286f6cd1","resourceVersion":"9461","creationTimestamp":"2026-03-08T21:58:26Z","labels":{"k8s-app":"cluster-baremetal-operator","pod-template-hash":"5cdb4c5598"},"annotations":{"capability.openshift.io/name":"baremetal","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.58/23\"],\"mac_address\":\"0a:58:0a:80:00:3a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.58/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.58\"\n ],\n \"mac\": \"0a:58:0a:80:00:3a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-baremetal-operator-5cdb4c5598","uid":"bf51ece0-dfcf-462c-a7cc-e0cd466737ac","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-baremetal-webhook-server-cert","defaultMode":420}},{"name":"config","configMap":{"name":"baremetal-kube-rbac-proxy","defaultMode":420}},{"name":"cluster-baremetal-operator-tls","secret":{"secretName":"cluster-baremetal-operator-tls","defaultMode":420}},{"name":"images","configMap":{"name":"cluster-baremetal-operator-images","defaultMode":420}},{"name":"kube-api-access-znqrj","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-baremetal-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","command":["/usr/bin/cluster-baremetal-operator"],"args":["--enable-leader-election"],"ports":[{"name":"webhook-server","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/tls"},{"name":"images","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/images"},{"name":"kube-api-access-znqrj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"baremetal-kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--config-file=/etc/baremetal-kube-rbac-proxy/config-file.yaml","--logtostderr=true","--v=10"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-znqrj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-baremetal-operator","serviceAccount":"cluster-baremetal-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c14"},"runAsUser":65534,"runAsNonRoot":true},"imagePullSecrets":[{"name":"cluster-baremetal-operator-dockercfg-b4pnr"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:31Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:26Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.58","podIPs":[{"ip":"10.128.0.58"}],"startTime":"2026-03-08T21:58:26Z","containerStatuses":[{"name":"baremetal-kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-08T21:58:31Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://93b37166e7a76abfca6ddb5300495d48bbcbeedf6828ba2c36f322ef2fec8592","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-znqrj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"cluster-baremetal-operator","state":{"running":{"startedAt":"2026-03-08T22:00:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"E0308 21:59:31.107716 1 main.go:144] \"unable to get enabled features\" err=\"unable to determine Platform: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster)\"\n","startedAt":"2026-03-08T21:58:31Z","finishedAt":"2026-03-08T21:59:31Z","containerID":"cri-o://6edcb8198a1dd9b552f9d5577953c53700190a2b87b4307329abfdbc057033f6"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","containerID":"cri-o://bcc6f26fb91d7fadf6887617bfb463e5c03667a9473c0563f69e191080e03b4a","started":true,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-baremetal-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"images","mountPath":"/etc/cluster-baremetal-operator/images","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-znqrj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-677db989d6-cjdgr.json0000640000000000000000000002442315153371005025414 0ustar0000000000000000{"metadata":{"name":"ingress-operator-677db989d6-cjdgr","generateName":"ingress-operator-677db989d6-","namespace":"openshift-ingress-operator","uid":"84bb22b5-b954-4fa2-b6c0-2f32a8cd7bed","resourceVersion":"9503","creationTimestamp":"2026-03-08T21:56:07Z","labels":{"name":"ingress-operator","pod-template-hash":"677db989d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-677db989d6","uid":"fe507074-d768-4d3d-878d-9093c879a048","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-vwdhp","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-vwdhp","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-vwdhp","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:57Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-03-08T21:57:18Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-08T22:01:39Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ed, waiting for all workers to finish\t{\"controller\": \"monitoring_dashboard_controller\"}\n2026-03-08T21:59:57.851Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"ingress_controller\"}\n2026-03-08T21:59:57.851Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"monitoring_dashboard_controller\"}\n2026-03-08T21:59:57.851Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"status_controller\"}\n2026-03-08T21:59:57.851Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"dns_controller\"}\n2026-03-08T21:59:57.851Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tShutdown signal received, waiting for all workers to finish\t{\"controller\": \"crl\"}\n2026-03-08T21:59:57.852Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"crl\"}\n2026-03-08T22:00:27.851Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for caches\n2026-03-08T22:00:27.851Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-03-08T22:00:27.851Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\n2026-03-08T22:00:27.851Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-03-08T22:00:27.852Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-08T22:00:27.852Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"[failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route, failed waiting for all runnables to end within grace period of 30s: context deadline exceeded]\", \"errorCauses\": [{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}, {\"error\": \"failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\"}]}\n","startedAt":"2026-03-08T21:57:56Z","finishedAt":"2026-03-08T22:00:27Z","containerID":"cri-o://1a0df161078208a525b4d1fb6d4ca6198700570b496ec5545cc3b9587304d8a5"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","containerID":"cri-o://799bcb818f10708811e14b095b41eda5205477d4badc6517a720213a0c436a29","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-vwdhp","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-08T21:57:57Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://9164ea1a943910cf9b8dc2033e053c71543704a60a430439fd1cb5398e260074","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-vwdhp","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-8565d84698-x8jg8.json0000640000000000000000000002053615153371005033315 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8565d84698-x8jg8","generateName":"openshift-controller-manager-operator-8565d84698-","namespace":"openshift-controller-manager-operator","uid":"d4d01185-e485-4697-92c2-31a044f25d82","resourceVersion":"9426","creationTimestamp":"2026-03-08T21:56:07Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8565d84698"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.5/23\"],\"mac_address\":\"0a:58:0a:80:00:05\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.5/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.5\"\n ],\n \"mac\": \"0a:58:0a:80:00:05\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8565d84698","uid":"12f8ae54-b47f-4195-8a1c-f159608c2f67","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-ngf2z","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-ngf2z","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c10"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.5","podIPs":[{"ip":"10.128.0.5"}],"startTime":"2026-03-08T21:57:18Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-08T22:00:08Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":":57:37Z\",\"message\":\"Progressing: deployment/controller-manager: observed generation is 5, desired generation is 6.\\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\",\"reason\":\"_DesiredStateNotYetAchieved\",\"status\":\"True\",\"type\":\"Progressing\"},{\"lastTransitionTime\":\"2026-03-08T21:58:15Z\",\"message\":\"All is well\",\"reason\":\"AsExpected\",\"status\":\"True\",\"type\":\"Available\"},{\"lastTransitionTime\":\"2026-03-08T21:57:37Z\",\"message\":\"All is well\",\"reason\":\"AsExpected\",\"status\":\"True\",\"type\":\"Upgradeable\"},{\"lastTransitionTime\":\"2026-03-08T21:57:32Z\",\"reason\":\"NoData\",\"status\":\"Unknown\",\"type\":\"EvaluationConditionsDetected\"}]}}\nE0308 21:58:15.658111 1 base_controller.go:279] \"Unhandled Error\" err=\"StatusSyncer_openshift-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \\\"openshift-controller-manager\\\": the object has been modified; please apply your changes to the latest version and try again\"\nI0308 21:59:01.496508 1 observer_polling.go:111] Observed file \"/var/run/secrets/serving-cert/tls.crt\" has been created (hash=\"d03884e63c10fae21ae668815d5c96f6dc30e67c03ddf36f8031251f647bf697\")\nW0308 21:59:01.496584 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created\nI0308 21:59:01.496688 1 observer_polling.go:111] Observed file \"/var/run/secrets/serving-cert/tls.key\" has been created (hash=\"f43936420793878db75cf78debacb9363f1803e14e4abea70f358b99bf6de2a2\")\nI0308 21:59:01.496842 1 genericapiserver.go:691] \"[graceful-termination] pre-shutdown hooks completed\" name=\"PreShutdownHooksStopped\"\nI0308 21:59:01.496895 1 genericapiserver.go:546] \"[graceful-termination] shutdown event\" name=\"ShutdownInitiated\"\nI0308 21:59:01.497134 1 base_controller.go:181] Shutting down OpenshiftControllerManagerStaticResources-StaticResources ...\nW0308 21:59:01.497297 1 builder.go:136] graceful termination failed, controllers failed with error: stopped\n","startedAt":"2026-03-08T21:57:31Z","finishedAt":"2026-03-08T21:59:01Z","containerID":"cri-o://2f8d7fcda4e6f52fa1e1bae05fb59e3135aaa4a13581f1a085c1284cb2c0e356"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","containerID":"cri-o://5af2147c5b6156b079ec16c643f5bc1c46f463b8da9a0f84030507704a3988c2","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-ngf2z","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-wklhr.json0000640000000000000000000001667615153371005030257 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-7577d6f48-wklhr","generateName":"csi-snapshot-controller-7577d6f48-","namespace":"openshift-cluster-storage-operator","uid":"c901b468-b8e9-48f8-8050-0d54e24e2adb","resourceVersion":"9498","creationTimestamp":"2026-03-08T21:57:33Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"7577d6f48"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.28/23\"],\"mac_address\":\"0a:58:0a:80:00:1c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.28/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.28\"\n ],\n \"mac\": \"0a:58:0a:80:00:1c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-7577d6f48","uid":"fa644fd1-8eb5-4289-a73f-bd083bbc3812","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-hmfqq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-hmfqq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000170000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c7"},"runAsNonRoot":true,"fsGroup":1000170000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:33Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:57:33Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.28","podIPs":[{"ip":"10.128.0.28"}],"startTime":"2026-03-08T21:57:33Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-08T22:01:39Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler-leader\nI0308 21:57:39.273738 1 leader_election.go:184] \"became leader, starting\"\nI0308 21:57:39.273901 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0308 21:57:39.273921 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0308 21:57:39.274692 1 snapshot_controller_base.go:255] Starting snapshot controller\nI0308 21:57:39.276128 1 reflector.go:368] Caches populated for *v1.VolumeSnapshot from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0308 21:57:39.276540 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160\nI0308 21:57:39.276743 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotClass from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0308 21:57:39.277006 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160\nI0308 21:57:39.278061 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotContent from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nE0308 21:59:05.620713 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0308 22:00:05.624337 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-storage-operator/snapshot-controller-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io snapshot-controller-leader)\nI0308 22:00:18.318115 1 leaderelection.go:297] failed to renew lease openshift-cluster-storage-operator/snapshot-controller-leader: timed out waiting for the condition\nE0308 22:00:18.318228 1 leader_election.go:188] \"Stopped leading\"\n","startedAt":"2026-03-08T21:57:39Z","finishedAt":"2026-03-08T22:00:18Z","containerID":"cri-o://975d86808356450f32e152ee3c49e6ab2d8f04281755488f22f0b7506389bb2d"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","containerID":"cri-o://2bcf2f4522ec1e98454f0d3a88ae01a27705138b2f5fbbd08bc581f106c16a5d","started":true,"volumeMounts":[{"name":"kube-api-access-hmfqq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-qv4bv.json0000640000000000000000000002537315153371005026037 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-7f8b8b6f4c-qv4bv","generateName":"catalogd-controller-manager-7f8b8b6f4c-","namespace":"openshift-catalogd","uid":"2a91f36f-900e-4b99-9be1-dfc61d8e31d9","resourceVersion":"9464","creationTimestamp":"2026-03-08T21:58:00Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"7f8b8b6f4c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.43/23\"],\"mac_address\":\"0a:58:0a:80:00:2b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.43/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.43\"\n ],\n \"mac\": \"0a:58:0a:80:00:2b\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-7f8b8b6f4c","uid":"f796a79b-308c-4e24-a939-89f07abbba86","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-ftn6p","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-ftn6p","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-ftn6p","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:00Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T22:01:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:00Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.43","podIPs":[{"ip":"10.128.0.43"}],"startTime":"2026-03-08T21:58:00Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-08T21:58:05Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://5166b178c19287374a46a00ef88c5dfe4724a44440d45b1e58c811dacd606607","started":true,"volumeMounts":[{"name":"kube-api-access-ftn6p","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-08T22:00:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"rGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"d2150249-4b82-4661-9d0c-5c34caed5d6d\" layer=1\nI0308 21:59:59.655502 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"d2150249-4b82-4661-9d0c-5c34caed5d6d\" layer=2\nI0308 22:00:01.988145 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"d2150249-4b82-4661-9d0c-5c34caed5d6d\" layer=3\nI0308 22:00:03.241772 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"d2150249-4b82-4661-9d0c-5c34caed5d6d\" layer=4\nE0308 22:00:06.248897 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0308 22:00:19.187926 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0308 22:00:19.188059 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\nI0308 22:00:19.188140 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\nI0308 22:00:19.188164 1 internal.go:542] \"Stopping and waiting for leader election runnables\"\n","startedAt":"2026-03-08T21:58:06Z","finishedAt":"2026-03-08T22:00:19Z","containerID":"cri-o://69b4132a818df716de03fdd12ebf683c551197394c831d762cb2338396e793c4"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","containerID":"cri-o://bbaef61fb3881295b80f5476ce40c1eeb152f4f8c17f1203f7df159cc62e41fb","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-ftn6p","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715153371005017533 0ustar0000000000000000[{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-08T21:57:58Z","not_after":"2028-03-07T21:57:59Z","controllers":[]},{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-08T21:57:57Z","not_after":"2028-03-07T21:57:58Z","controllers":[]}]config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515153371005023215 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115153371005025425 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715153371005025125 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715153371005025134 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315153371005022245 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515153371005026701 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115153371005023404 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115153371005023200 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115153371005025470 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- events/openshift-machine-api.json0000640000000000000000000001071115153371005015607 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-08T21:59:28Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-autoscaler-operator-69576476f7-dvgxg_openshift-machine-api_d9fe466f-5a23-4f69-8a96-44bd5d6194f5_0(bf7b1132618d1c48679a37a92c47da904a94bad73427003b42e475870a685452): error adding pod openshift-machine-api_cluster-autoscaler-operator-69576476f7-dvgxg to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"bf7b1132618d1c48679a37a92c47da904a94bad73427003b42e475870a685452\" Netns:\"/var/run/netns/ab66b324-18d3-49be-a7bb-91f00cf3c2fa\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=cluster-autoscaler-operator-69576476f7-dvgxg;K8S_POD_INFRA_CONTAINER_ID=bf7b1132618d1c48679a37a92c47da904a94bad73427003b42e475870a685452;K8S_POD_UID=d9fe466f-5a23-4f69-8a96-44bd5d6194f5\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/cluster-autoscaler-operator-69576476f7-dvgxg] networking: Multus: [openshift-machine-api/cluster-autoscaler-operator-69576476f7-dvgxg/d9fe466f-5a23-4f69-8a96-44bd5d6194f5]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-autoscaler-operator-69576476f7-dvgxg in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-autoscaler-operator-69576476f7-dvgxg in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/cluster-autoscaler-operator-69576476f7-dvgxg?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-08T22:00:29Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-autoscaler-operator-69576476f7-dvgxg_openshift-machine-api_d9fe466f-5a23-4f69-8a96-44bd5d6194f5_0(9acc1157ff6419984c9222f358a8b89a149b70dd33398836d26a60840e08ea33): error adding pod openshift-machine-api_cluster-autoscaler-operator-69576476f7-dvgxg to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"9acc1157ff6419984c9222f358a8b89a149b70dd33398836d26a60840e08ea33\" Netns:\"/var/run/netns/400a54d3-aabd-4492-b2f3-664268fd9129\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=cluster-autoscaler-operator-69576476f7-dvgxg;K8S_POD_INFRA_CONTAINER_ID=9acc1157ff6419984c9222f358a8b89a149b70dd33398836d26a60840e08ea33;K8S_POD_UID=d9fe466f-5a23-4f69-8a96-44bd5d6194f5\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/cluster-autoscaler-operator-69576476f7-dvgxg] networking: Multus: [openshift-machine-api/cluster-autoscaler-operator-69576476f7-dvgxg/d9fe466f-5a23-4f69-8a96-44bd5d6194f5]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-autoscaler-operator-69576476f7-dvgxg in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-autoscaler-operator-69576476f7-dvgxg in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/cluster-autoscaler-operator-69576476f7-dvgxg?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"}]}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315153371005023442 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"15a5c122-da42-44df-8dd4-c83efbc197af","resourceVersion":"4323","generation":1,"creationTimestamp":"2026-03-08T21:57:33Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015153371005022045 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"87416a5b-668c-4c1d-bed1-c4906c2d5581","resourceVersion":"4300","generation":1,"creationTimestamp":"2026-03-08T21:57:33Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-08T21:57:33Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/machinehealthchecks/openshift-machine-api/machine-api-termination-handler.json0000640000000000000000000000163315153371005027643 0ustar0000000000000000{"apiVersion":"machine.openshift.io/v1beta1","kind":"MachineHealthCheck","metadata":{"annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"creationTimestamp":"2026-03-08T22:02:18Z","generation":1,"labels":{"api":"clusterapi","k8s-app":"termination-handler"},"name":"machine-api-termination-handler","namespace":"openshift-machine-api","ownerReferences":[{"apiVersion":"config.openshift.io/v1","controller":true,"kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50"}],"resourceVersion":"10308","uid":"6b71cc1c-921b-43a3-8ed3-78ba9233f26c"},"spec":{"maxUnhealthy":"100%","nodeStartupTimeout":"0","selector":{"matchLabels":{"machine.openshift.io/interruptible-instance":""}},"unhealthyConditions":[{"status":"True","timeout":"0s","type":"Terminating"}]}}config/image.json0000640000000000000000000000111715153371005012462 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"1d1f4d30-8ae6-41ad-8dfb-e2521652ecad","resourceVersion":"1605","generation":1,"creationTimestamp":"2026-03-08T21:52:26Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002231415153371005025474 0ustar0000000000000000{"metadata":{"name":"edit","uid":"443e13b1-5772-4d78-b0b7-5c2d9f8400e2","resourceVersion":"10591","creationTimestamp":"2026-03-08T21:50:36Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002520115153371005025635 0ustar0000000000000000{"metadata":{"name":"admin","uid":"547c3e9e-febf-4405-898d-dccd958e8a17","resourceVersion":"10612","creationTimestamp":"2026-03-08T21:50:36Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/pod/openshift-cluster-version/cluster-version-operator-8c9c967c7-ln9l2.json0000640000000000000000000001341415153371005026525 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-8c9c967c7-ln9l2","generateName":"cluster-version-operator-8c9c967c7-","namespace":"openshift-cluster-version","uid":"f7f6b35a-6cf0-4256-aa4d-0a57d10ce7e9","resourceVersion":"6873","creationTimestamp":"2026-03-08T21:58:04Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"8c9c967c7"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-8c9c967c7","uid":"eddeb7be-82bb-44d2-8b3c-112350e6cc28","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:05Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:04Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-08T21:58:04Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-08T21:58:04Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-08T21:58:04Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","containerID":"cri-o://a22b29816e03690faf00c5c6d5f7ea0b06750cd2c50fe9f666b86154f5e12d55","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415153371005011022 0ustar0000000000000000291a9d1b-b56d-4b0c-8a27-f63e1c621e74config/version.json0000640000000000000000000000530315153371005013066 0ustar0000000000000000{"metadata":{"name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","resourceVersion":"10783","generation":2,"creationTimestamp":"2026-03-08T21:51:35Z"},"spec":{"clusterID":"291a9d1b-b56d-4b0c-8a27-f63e1c621e74","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","url":"https://access.redhat.com/errata/RHSA-2026:2977","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-08T21:52:09Z","completionTime":null,"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","verified":false}],"observedGeneration":2,"versionHash":"p13mOMOOYQo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-08T21:52:09Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-08T21:52:09Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-08T21:52:09Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-08T21:52:09Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-08T21:52:09Z"},{"type":"Failing","status":"False","lastTransitionTime":"2026-03-08T22:02:39Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-08T21:52:09Z","message":"Working towards 4.18.34: 795 of 908 done (87% complete)"}],"availableUpdates":null}}config/authentication.json0000640000000000000000000000116515153371005014422 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"e8443a21-6d19-41fa-a3e0-77d3a3add976","resourceVersion":"1164","generation":1,"creationTimestamp":"2026-03-08T21:52:17Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/apiserver.json0000640000000000000000000000121615153371005013400 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"932f748b-6dad-4c21-a668-afb22d83b09f","resourceVersion":"920","generation":1,"creationTimestamp":"2026-03-08T21:52:11Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/oauth.json0000640000000000000000000000114415153371005012520 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d8264078-6d37-46ef-885c-6c6e50083841","resourceVersion":"1680","generation":1,"creationTimestamp":"2026-03-08T21:52:28Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/machineconfigpools/worker.json0000640000000000000000000001013515153371005016560 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-08T22:02:03Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10621","uid":"d2da1796-1dbd-4b9b-a920-b8e26ba67242"},"spec":{"configuration":{"name":"rendered-worker-2d82b8370516a3b17a9fdc57953c84fa","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-05T21:40:59Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-09T21:47:40Z","subject":"CN=kube-csr-signer_@1773007054"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-09T21:47:40Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T21:47:41Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T21:47:40Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-05T21:47:38Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T21:57:21Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773007040"}],"conditions":[{"lastTransitionTime":"2026-03-08T22:02:20Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-08T22:02:25Z","message":"All nodes are updated with MachineConfig rendered-worker-2d82b8370516a3b17a9fdc57953c84fa","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-08T22:02:25Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-08T22:02:25Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-08T22:02:25Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-worker-2d82b8370516a3b17a9fdc57953c84fa","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":2,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000001241015153371005016540 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-08T22:02:03Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10635","uid":"e988bd5b-35e1-48c0-8293-e1c0814e03b4"},"spec":{"configuration":{"name":"rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-05T21:40:59Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-09T21:47:40Z","subject":"CN=kube-csr-signer_@1773007054"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-09T21:47:40Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T21:47:41Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T21:47:40Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-05T21:47:38Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-08T21:57:21Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773007040"}],"conditions":[{"lastTransitionTime":"2026-03-08T22:02:20Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-08T22:02:25Z","message":"All nodes are updated with MachineConfig rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-08T22:02:25Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-08T22:02:25Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-08T22:02:25Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-master-30f2d585d03cf0d38c04f0bc1f523b7d","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"degradedMachineCount":0,"machineCount":1,"observedGeneration":2,"readyMachineCount":1,"unavailableMachineCount":0,"updatedMachineCount":1}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173615153371005025121 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"8b5bd544-bb45-47b4-a1fb-df246271e143","resourceVersion":"10010","generation":1,"creationTimestamp":"2026-03-08T21:52:27Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-08T22:02:04Z","reason":"SufficientPods","message":""}]}}config/infrastructure.json0000640000000000000000000000106515153371005014462 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0dba1d18-d883-4897-b138-82af1e90d837","resourceVersion":"535","generation":1,"creationTimestamp":"2026-03-08T21:51:30Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/proxy.json0000640000000000000000000000031315153371005012556 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"9773d994-9b47-416c-aebe-3a726f4bd073","resourceVersion":"551","generation":1,"creationTimestamp":"2026-03-08T21:51:31Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/featuregate.json0000640000000000000000000000613615153371005013702 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d74311f3-7cba-4d74-9034-5000fff6e754","resourceVersion":"642","generation":1,"creationTimestamp":"2026-03-08T21:51:52Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.34","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/ingress.json0000640000000000000000000000043615153371005013055 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"8aa3adde-ee31-471b-92fa-0369b4c31408","resourceVersion":"548","generation":1,"creationTimestamp":"2026-03-08T21:51:30Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115153371005027746 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"37137c4e-c518-44e5-be7c-67c924bcf285","resourceVersion":"6362","generation":1,"creationTimestamp":"2026-03-08T21:57:57Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-08T21:57:57Z","reason":"AsExpected"}]}}config/network.json0000640000000000000000000000117015153371005013070 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d6f2244a-a0f3-4567-8531-0549e89065b9","resourceVersion":"3235","generation":2,"creationTimestamp":"2026-03-08T21:51:31Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615153371005027476 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"ec10ced1-8b74-4a7c-9a4b-dad3e71b646d","resourceVersion":"6188","generation":2,"creationTimestamp":"2026-03-08T21:57:56Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515153371005025730 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"77e2138f-9550-4b66-9ae5-473606598033","resourceVersion":"10348","generation":2,"creationTimestamp":"2026-03-08T22:02:19Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115153371005025274 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"543bff93-5851-42c6-ac9a-0001f975a403","resourceVersion":"4697","generation":2,"creationTimestamp":"2026-03-08T21:52:36Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515153371005026733 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"1b364f49-0f23-437c-ba6e-0f06805200c1","resourceVersion":"7018","generation":1,"creationTimestamp":"2026-03-08T21:58:08Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"3c57bfd3-10ef-4c90-b0ca-6c99262766b5","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715153371005024021 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"95355bb3-ae97-4a69-9fb7-612130039d99","resourceVersion":"4696","generation":2,"creationTimestamp":"2026-03-08T21:56:28Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"3c57bfd3-10ef-4c90-b0ca-6c99262766b5","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537215153371005030633 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"560ddba5-cac0-49f5-b565-0e657ceaf42a","resourceVersion":"9530","generation":2,"creationTimestamp":"2026-03-08T22:01:43Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"b88523fa-e31f-426c-b037-4ff539d78b50","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115153371005032104 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"8339a170-29ae-4f1f-8889-a4f8447440c6","resourceVersion":"9169","generation":2,"creationTimestamp":"2026-03-08T22:01:25Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102615153371005024771 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"9161834c-2aee-4c79-bc57-995b97f3cf8d","resourceVersion":"9521","generation":2,"creationTimestamp":"2026-03-08T22:01:42Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315153371005026476 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"6103670e-bd65-4afb-9dce-8c4a4bb08124","resourceVersion":"10354","generation":2,"creationTimestamp":"2026-03-08T22:02:19Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/schedulers/cluster.json0000640000000000000000000000052415153371005015223 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"a7c40b71-be4b-4c7a-96c4-2a422f6a55c7","resourceVersion":"557","generation":1,"creationTimestamp":"2026-03-08T21:51:33Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}