--- apiVersion: config.openshift.io/v1 kind: ClusterOperator metadata: annotations: include.release.openshift.io/ibm-cloud-managed: "true" include.release.openshift.io/self-managed-high-availability: "true" include.release.openshift.io/single-node-developer: "true" network.operator.openshift.io/last-seen-state: '{"DaemonsetStates":[],"DeploymentStates":[],"StatefulsetStates":[]}' network.operator.openshift.io/relatedClusterObjects: "" creationTimestamp: "2025-10-11T10:25:18Z" generation: 1 managedFields: - apiVersion: config.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:include.release.openshift.io/ibm-cloud-managed: {} f:include.release.openshift.io/self-managed-high-availability: {} f:include.release.openshift.io/single-node-developer: {} f:ownerReferences: .: {} k:{"uid":"d5f199fe-acec-4610-b505-6d5fa3929e77"}: {} f:spec: {} manager: cluster-version-operator operation: Update time: "2025-10-11T10:25:18Z" - apiVersion: config.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:status: .: {} f:extension: {} manager: cluster-version-operator operation: Update subresource: status time: "2025-10-11T10:25:19Z" - apiVersion: config.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:network.operator.openshift.io/last-seen-state: {} f:network.operator.openshift.io/relatedClusterObjects: {} manager: network-operator operation: Update time: "2025-10-11T10:39:50Z" - apiVersion: config.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: {} f:relatedObjects: {} f:versions: {} manager: network-operator operation: Update subresource: status time: "2025-10-11T10:40:12Z" name: network ownerReferences: - apiVersion: config.openshift.io/v1 controller: true kind: ClusterVersion name: version uid: d5f199fe-acec-4610-b505-6d5fa3929e77 resourceVersion: "20883" uid: c555f23d-6df0-4ff1-a899-6f8107549d69 spec: {} status: conditions: - lastTransitionTime: "2025-10-11T10:27:13Z" status: "False" type: ManagementStateDegraded - lastTransitionTime: "2025-10-11T10:37:35Z" status: "False" type: Degraded - lastTransitionTime: "2025-10-11T10:27:01Z" status: "True" type: Upgradeable - lastTransitionTime: "2025-10-11T10:40:12Z" status: "False" type: Progressing - lastTransitionTime: "2025-10-11T10:28:13Z" status: "True" type: Available extension: null relatedObjects: - group: "" name: applied-cluster namespace: openshift-network-operator resource: configmaps - group: apiextensions.k8s.io name: network-attachment-definitions.k8s.cni.cncf.io resource: customresourcedefinitions - group: apiextensions.k8s.io name: ippools.whereabouts.cni.cncf.io resource: customresourcedefinitions - group: apiextensions.k8s.io name: overlappingrangeipreservations.whereabouts.cni.cncf.io resource: customresourcedefinitions - group: apiextensions.k8s.io name: nodeslicepools.whereabouts.cni.cncf.io resource: customresourcedefinitions - group: "" name: openshift-multus resource: namespaces - group: rbac.authorization.k8s.io name: multus resource: clusterroles - group: rbac.authorization.k8s.io name: multus-ancillary-tools resource: clusterroles - group: "" name: multus namespace: openshift-multus resource: serviceaccounts - group: rbac.authorization.k8s.io name: multus-transient resource: clusterrolebindings - group: rbac.authorization.k8s.io name: multus-group resource: clusterrolebindings - group: "" name: multus-ancillary-tools namespace: openshift-multus resource: serviceaccounts - group: rbac.authorization.k8s.io name: multus-ancillary-tools resource: clusterrolebindings - group: rbac.authorization.k8s.io name: multus-cluster-readers resource: clusterrolebindings - group: rbac.authorization.k8s.io name: multus-whereabouts resource: clusterrolebindings - group: rbac.authorization.k8s.io name: multus-whereabouts namespace: openshift-multus resource: rolebindings - group: rbac.authorization.k8s.io name: whereabouts-cni resource: clusterroles - group: rbac.authorization.k8s.io name: whereabouts-cni namespace: openshift-multus resource: roles - group: rbac.authorization.k8s.io name: net-attach-def-project resource: clusterroles - group: "" name: default-cni-sysctl-allowlist namespace: openshift-multus resource: configmaps - group: "" name: cni-copy-resources namespace: openshift-multus resource: configmaps - group: "" name: whereabouts-config namespace: openshift-multus resource: configmaps - group: "" name: multus-daemon-config namespace: openshift-multus resource: configmaps - group: apps name: multus namespace: openshift-multus resource: daemonsets - group: apps name: multus-additional-cni-plugins namespace: openshift-multus resource: daemonsets - group: "" name: metrics-daemon-sa namespace: openshift-multus resource: serviceaccounts - group: rbac.authorization.k8s.io name: metrics-daemon-role resource: clusterroles - group: rbac.authorization.k8s.io name: metrics-daemon-sa-rolebinding resource: clusterrolebindings - group: apps name: network-metrics-daemon namespace: openshift-multus resource: daemonsets - group: monitoring.coreos.com name: monitor-network namespace: openshift-multus resource: servicemonitors - group: "" name: network-metrics-service namespace: openshift-multus resource: services - group: rbac.authorization.k8s.io name: prometheus-k8s namespace: openshift-multus resource: roles - group: rbac.authorization.k8s.io name: prometheus-k8s namespace: openshift-multus resource: rolebindings - group: "" name: multus-admission-controller namespace: openshift-multus resource: services - group: "" name: multus-ac namespace: openshift-multus resource: serviceaccounts - group: rbac.authorization.k8s.io name: multus-admission-controller-webhook resource: clusterroles - group: rbac.authorization.k8s.io name: multus-admission-controller-webhook resource: clusterrolebindings - group: admissionregistration.k8s.io name: multus.openshift.io resource: validatingwebhookconfigurations - group: apps name: multus-admission-controller namespace: openshift-multus resource: deployments - group: monitoring.coreos.com name: monitor-multus-admission-controller namespace: openshift-multus resource: servicemonitors - group: rbac.authorization.k8s.io name: prometheus-k8s namespace: openshift-multus resource: roles - group: rbac.authorization.k8s.io name: prometheus-k8s namespace: openshift-multus resource: rolebindings - group: monitoring.coreos.com name: prometheus-k8s-rules namespace: openshift-multus resource: prometheusrules - group: "" name: openshift-ovn-kubernetes resource: namespaces - group: apiextensions.k8s.io name: egressfirewalls.k8s.ovn.org resource: customresourcedefinitions - group: apiextensions.k8s.io name: egressips.k8s.ovn.org resource: customresourcedefinitions - group: apiextensions.k8s.io name: egressqoses.k8s.ovn.org resource: customresourcedefinitions - group: apiextensions.k8s.io name: adminpolicybasedexternalroutes.k8s.ovn.org resource: customresourcedefinitions - group: apiextensions.k8s.io name: egressservices.k8s.ovn.org resource: customresourcedefinitions - group: apiextensions.k8s.io name: adminnetworkpolicies.policy.networking.k8s.io resource: customresourcedefinitions - group: apiextensions.k8s.io name: baselineadminnetworkpolicies.policy.networking.k8s.io resource: customresourcedefinitions - group: apiextensions.k8s.io name: ipamclaims.k8s.cni.cncf.io resource: customresourcedefinitions - group: apiextensions.k8s.io name: userdefinednetworks.k8s.ovn.org resource: customresourcedefinitions - group: apiextensions.k8s.io name: clusteruserdefinednetworks.k8s.ovn.org resource: customresourcedefinitions - group: "" name: ovn-kubernetes-node namespace: openshift-ovn-kubernetes resource: serviceaccounts - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-node-limited namespace: openshift-ovn-kubernetes resource: roles - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-nodes-identity-limited namespace: openshift-ovn-kubernetes resource: rolebindings - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-node-limited resource: clusterroles - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-node-identity-limited resource: clusterrolebindings - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-kube-rbac-proxy resource: clusterroles - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-node-kube-rbac-proxy resource: clusterrolebindings - group: "" name: ovnkube-config namespace: openshift-ovn-kubernetes resource: configmaps - group: "" name: ovn-kubernetes-control-plane namespace: openshift-ovn-kubernetes resource: serviceaccounts - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-control-plane-limited resource: clusterroles - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-control-plane-limited resource: clusterrolebindings - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-control-plane-limited namespace: openshift-ovn-kubernetes resource: roles - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-control-plane-limited namespace: openshift-ovn-kubernetes resource: rolebindings - group: network.operator.openshift.io name: ovn namespace: openshift-ovn-kubernetes resource: operatorpkis - group: network.operator.openshift.io name: signer namespace: openshift-ovn-kubernetes resource: operatorpkis - group: flowcontrol.apiserver.k8s.io name: openshift-ovn-kubernetes resource: flowschemas - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-cluster-reader resource: clusterroles - group: "" name: ovnkube-script-lib namespace: openshift-ovn-kubernetes resource: configmaps - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-udn-editor resource: clusterroles - group: rbac.authorization.k8s.io name: openshift-ovn-kubernetes-udn-viewer resource: clusterroles - group: monitoring.coreos.com name: master-rules namespace: openshift-ovn-kubernetes resource: prometheusrules - group: monitoring.coreos.com name: networking-rules namespace: openshift-ovn-kubernetes resource: prometheusrules - group: "" name: openshift-network-features namespace: openshift-config-managed resource: configmaps - group: monitoring.coreos.com name: monitor-ovn-control-plane-metrics namespace: openshift-ovn-kubernetes resource: servicemonitors - group: "" name: ovn-kubernetes-control-plane namespace: openshift-ovn-kubernetes resource: services - group: monitoring.coreos.com name: monitor-ovn-node namespace: openshift-ovn-kubernetes resource: servicemonitors - group: "" name: ovn-kubernetes-node namespace: openshift-ovn-kubernetes resource: services - group: rbac.authorization.k8s.io name: prometheus-k8s namespace: openshift-ovn-kubernetes resource: roles - group: rbac.authorization.k8s.io name: prometheus-k8s namespace: openshift-ovn-kubernetes resource: rolebindings - group: "" name: openshift-host-network resource: namespaces - group: "" name: host-network-namespace-quotas namespace: openshift-host-network resource: resourcequotas - group: apps name: ovnkube-control-plane namespace: openshift-ovn-kubernetes resource: deployments - group: apps name: ovnkube-node namespace: openshift-ovn-kubernetes resource: daemonsets - group: admissionregistration.k8s.io name: user-defined-networks-namespace-label resource: validatingadmissionpolicies - group: admissionregistration.k8s.io name: user-defined-networks-namespace-label-binding resource: validatingadmissionpolicybindings - group: "" name: openshift-network-diagnostics resource: namespaces - group: "" name: network-diagnostics namespace: openshift-network-diagnostics resource: serviceaccounts - group: rbac.authorization.k8s.io name: network-diagnostics namespace: openshift-network-diagnostics resource: roles - group: rbac.authorization.k8s.io name: network-diagnostics namespace: openshift-network-diagnostics resource: rolebindings - group: rbac.authorization.k8s.io name: network-diagnostics resource: clusterroles - group: rbac.authorization.k8s.io name: network-diagnostics resource: clusterrolebindings - group: rbac.authorization.k8s.io name: network-diagnostics namespace: kube-system resource: rolebindings - group: apps name: network-check-source namespace: openshift-network-diagnostics resource: deployments - group: "" name: network-check-source namespace: openshift-network-diagnostics resource: services - group: monitoring.coreos.com name: network-check-source namespace: openshift-network-diagnostics resource: servicemonitors - group: rbac.authorization.k8s.io name: prometheus-k8s namespace: openshift-network-diagnostics resource: roles - group: rbac.authorization.k8s.io name: prometheus-k8s namespace: openshift-network-diagnostics resource: rolebindings - group: apps name: network-check-target namespace: openshift-network-diagnostics resource: daemonsets - group: "" name: network-check-target namespace: openshift-network-diagnostics resource: services - group: rbac.authorization.k8s.io name: openshift-network-public-role namespace: openshift-config-managed resource: roles - group: rbac.authorization.k8s.io name: openshift-network-public-role-binding namespace: openshift-config-managed resource: rolebindings - group: "" name: openshift-network-node-identity resource: namespaces - group: "" name: network-node-identity namespace: openshift-network-node-identity resource: serviceaccounts - group: rbac.authorization.k8s.io name: network-node-identity resource: clusterrolebindings - group: rbac.authorization.k8s.io name: network-node-identity resource: clusterroles - group: rbac.authorization.k8s.io name: network-node-identity-leases namespace: openshift-network-node-identity resource: rolebindings - group: rbac.authorization.k8s.io name: network-node-identity-leases namespace: openshift-network-node-identity resource: roles - group: rbac.authorization.k8s.io name: system:openshift:scc:hostnetwork-v2 namespace: openshift-network-node-identity resource: rolebindings - group: "" name: ovnkube-identity-cm namespace: openshift-network-node-identity resource: configmaps - group: network.operator.openshift.io name: network-node-identity namespace: openshift-network-node-identity resource: operatorpkis - group: admissionregistration.k8s.io name: network-node-identity.openshift.io resource: validatingwebhookconfigurations - group: apps name: network-node-identity namespace: openshift-network-node-identity resource: daemonsets - group: monitoring.coreos.com name: openshift-network-operator-ipsec-rules namespace: openshift-network-operator resource: prometheusrules - group: rbac.authorization.k8s.io name: openshift-iptables-alerter resource: clusterroles - group: "" name: iptables-alerter namespace: openshift-network-operator resource: serviceaccounts - group: rbac.authorization.k8s.io name: openshift-iptables-alerter resource: clusterrolebindings - group: "" name: iptables-alerter-script namespace: openshift-network-operator resource: configmaps - group: apps name: iptables-alerter namespace: openshift-network-operator resource: daemonsets - group: "" name: openshift-network-console resource: namespaces - group: "" name: networking-console-plugin namespace: openshift-network-console resource: configmaps - group: apps name: networking-console-plugin namespace: openshift-network-console resource: deployments - group: "" name: networking-console-plugin namespace: openshift-network-console resource: services - group: console.openshift.io name: networking-console-plugin resource: consoleplugins - group: "" name: openshift-network-operator resource: namespaces - group: operator.openshift.io name: cluster resource: networks - group: "" name: openshift-cloud-network-config-controller resource: namespaces versions: - name: operator version: 4.18.25