--- apiVersion: v1 items: - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.130.0.28/23"],"mac_address":"0a:58:0a:82:00:1c","gateway_ips":["10.130.0.1"],"routes":[{"dest":"10.128.0.0/14","nextHop":"10.130.0.1"},{"dest":"172.30.0.0/16","nextHop":"10.130.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.130.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.130.0.1"}],"ip_address":"10.130.0.28/23","gateway_ip":"10.130.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.130.0.28" ], "mac": "0a:58:0a:82:00:1c", "default": true, "dns": {} }] openshift.io/required-scc: privileged openshift.io/scc: privileged operator.openshift.io/dep-desired.generation: "6" operator.openshift.io/dep-openshift-apiserver.config.configmap: uJHjJw== operator.openshift.io/dep-openshift-apiserver.etcd-client.secret: H-0Ygw== operator.openshift.io/dep-openshift-apiserver.etcd-serving-ca.configmap: HOMAdQ== operator.openshift.io/dep-openshift-apiserver.image-import-ca.configmap: OUXnWA== operator.openshift.io/dep-openshift-apiserver.trusted-ca-bundle.configmap: ElMHxA== creationTimestamp: "2025-10-11T10:42:13Z" generateName: apiserver-8865994fd- labels: apiserver: "true" app: openshift-apiserver-a openshift-apiserver-anti-affinity: "true" pod-template-hash: 8865994fd revision: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:operator.openshift.io/dep-desired.generation: {} f:operator.openshift.io/dep-openshift-apiserver.config.configmap: {} f:operator.openshift.io/dep-openshift-apiserver.etcd-client.secret: {} f:operator.openshift.io/dep-openshift-apiserver.etcd-serving-ca.configmap: {} f:operator.openshift.io/dep-openshift-apiserver.image-import-ca.configmap: {} f:operator.openshift.io/dep-openshift-apiserver.trusted-ca-bundle.configmap: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:apiserver: {} f:app: {} f:openshift-apiserver-anti-affinity: {} f:pod-template-hash: {} f:revision: {} f:ownerReferences: .: {} k:{"uid":"5362ab34-28a5-48f5-a081-2afa1dc88adb"}: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"openshift-apiserver"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"POD_NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsUser: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/lib/kubelet/"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/log/openshift-apiserver"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/audit"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/etcd-serving-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/image-import-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/trusted-ca-bundle"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/encryption-config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/etcd-client"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} k:{"name":"openshift-apiserver-check-endpoints"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"POD_NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":17698,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:initContainers: .: {} k:{"name":"fix-audit-permissions"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:runAsUser: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/log/openshift-apiserver"}: .: {} f:mountPath: {} f:name: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"audit"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"audit-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"encryption-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"etcd-client"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"etcd-serving-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"image-import-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:optional: {} f:name: {} k:{"name":"node-pullsecrets"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:optional: {} f:name: {} manager: kube-controller-manager operation: Update time: "2025-10-11T10:42:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: .: {} k:{"type":"PodScheduled"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:message: {} f:reason: {} f:status: {} f:type: {} manager: kube-scheduler operation: Update subresource: status time: "2025-10-11T10:42:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: master-0 operation: Update subresource: status time: "2025-10-11T10:44:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2025-10-11T10:44:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:initContainerStatuses: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.130.0.28"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2025-10-11T10:44:19Z" name: apiserver-8865994fd-4bs48 namespace: openshift-apiserver ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: apiserver-8865994fd uid: 5362ab34-28a5-48f5-a081-2afa1dc88adb resourceVersion: "23246" uid: cdf415dc-3a2a-4f52-90ae-81a963771876 spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: apiserver: "true" app: openshift-apiserver-a openshift-apiserver-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - | if [ -s /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem ]; then echo "Copying system trust bundle" cp -f /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem fi exec openshift-apiserver start --config=/var/run/configmaps/config/config.yaml -v=2 command: - /bin/bash - -ec env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name - name: POD_NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: livez?exclude=etcd port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: openshift-apiserver ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: readyz?exclude=etcd&exclude=etcd-readiness port: 8443 scheme: HTTPS periodSeconds: 5 successThreshold: 1 timeoutSeconds: 10 resources: requests: cpu: 100m memory: 200Mi securityContext: privileged: true readOnlyRootFilesystem: false runAsUser: 0 startupProbe: failureThreshold: 30 httpGet: path: livez port: 8443 scheme: HTTPS periodSeconds: 5 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/lib/kubelet/ name: node-pullsecrets readOnly: true - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/audit name: audit - mountPath: /var/run/secrets/etcd-client name: etcd-client - mountPath: /var/run/configmaps/etcd-serving-ca name: etcd-serving-ca - mountPath: /var/run/configmaps/image-import-ca name: image-import-ca - mountPath: /var/run/configmaps/trusted-ca-bundle name: trusted-ca-bundle - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /var/run/secrets/encryption-config name: encryption-config - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lzxkg readOnly: true - args: - --listen - 0.0.0.0:17698 - --namespace - $(POD_NAMESPACE) - --v - "2" command: - cluster-kube-apiserver-operator - check-endpoints env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name - name: POD_NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd52817806c4f947413297672397b0f17784eec91347b8d6f3a21f4b9921eb2e imagePullPolicy: IfNotPresent name: openshift-apiserver-check-endpoints ports: - containerPort: 17698 name: check-endpoints protocol: TCP resources: requests: cpu: 10m memory: 50Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lzxkg readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: openshift-apiserver-sa-dockercfg-lntq9 initContainers: - command: - sh - -c - chmod 0700 /var/log/openshift-apiserver && touch /var/log/openshift-apiserver/audit.log && chmod 0600 /var/log/openshift-apiserver/* image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imagePullPolicy: IfNotPresent name: fix-audit-permissions resources: requests: cpu: 15m memory: 50Mi securityContext: privileged: true runAsUser: 0 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lzxkg readOnly: true nodeName: master-0 nodeSelector: node-role.kubernetes.io/master: "" preemptionPolicy: PreemptLowerPriority priority: 2000001000 priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: openshift-apiserver-sa serviceAccountName: openshift-apiserver-sa terminationGracePeriodSeconds: 120 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node-role.kubernetes.io/control-plane operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - hostPath: path: /var/lib/kubelet/ type: Directory name: node-pullsecrets - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: audit-1 name: audit - name: etcd-client secret: defaultMode: 384 secretName: etcd-client - configMap: defaultMode: 420 name: etcd-serving-ca name: etcd-serving-ca - configMap: defaultMode: 420 name: image-import-ca optional: true name: image-import-ca - name: serving-cert secret: defaultMode: 384 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle optional: true name: trusted-ca-bundle - name: encryption-config secret: defaultMode: 384 optional: true secretName: encryption-config-1 - hostPath: path: /var/log/openshift-apiserver type: "" name: audit-dir - name: kube-api-access-lzxkg projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2025-10-11T10:44:15Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2025-10-11T10:44:15Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2025-10-11T10:44:19Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2025-10-11T10:44:19Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2025-10-11T10:44:13Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://ec910e69b540b523a147a7d7f29286f549aed08e47b9bfba169c2a9f41b1dc75 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 lastState: {} name: openshift-apiserver ready: true restartCount: 0 started: true state: running: startedAt: "2025-10-11T10:44:15Z" volumeMounts: - mountPath: /var/lib/kubelet/ name: node-pullsecrets readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/audit name: audit - mountPath: /var/run/secrets/etcd-client name: etcd-client - mountPath: /var/run/configmaps/etcd-serving-ca name: etcd-serving-ca - mountPath: /var/run/configmaps/image-import-ca name: image-import-ca - mountPath: /var/run/configmaps/trusted-ca-bundle name: trusted-ca-bundle - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /var/run/secrets/encryption-config name: encryption-config - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lzxkg readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://6f0df9b47b168a17643529973b548904eef2d99ee4ab5088c9894dedd37f5d9b image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd52817806c4f947413297672397b0f17784eec91347b8d6f3a21f4b9921eb2e imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd52817806c4f947413297672397b0f17784eec91347b8d6f3a21f4b9921eb2e lastState: {} name: openshift-apiserver-check-endpoints ready: true restartCount: 0 started: true state: running: startedAt: "2025-10-11T10:44:16Z" volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lzxkg readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.34.10 hostIPs: - ip: 192.168.34.10 initContainerStatuses: - containerID: cri-o://44a2752364aefd0e8ef37a371fc1a02b554d307c7f399e48a010a918f35a11b1 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 lastState: {} name: fix-audit-permissions ready: true restartCount: 0 started: false state: terminated: containerID: cri-o://44a2752364aefd0e8ef37a371fc1a02b554d307c7f399e48a010a918f35a11b1 exitCode: 0 finishedAt: "2025-10-11T10:44:14Z" reason: Completed startedAt: "2025-10-11T10:44:14Z" volumeMounts: - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-lzxkg readOnly: true recursiveReadOnly: Disabled phase: Running podIP: 10.130.0.28 podIPs: - ip: 10.130.0.28 qosClass: Burstable startTime: "2025-10-11T10:44:13Z" - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.128.0.93/23"],"mac_address":"0a:58:0a:80:00:5d","gateway_ips":["10.128.0.1"],"routes":[{"dest":"10.128.0.0/14","nextHop":"10.128.0.1"},{"dest":"172.30.0.0/16","nextHop":"10.128.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.128.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.128.0.1"}],"ip_address":"10.128.0.93/23","gateway_ip":"10.128.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.128.0.93" ], "mac": "0a:58:0a:80:00:5d", "default": true, "dns": {} }] openshift.io/required-scc: privileged openshift.io/scc: privileged operator.openshift.io/dep-desired.generation: "6" operator.openshift.io/dep-openshift-apiserver.config.configmap: uJHjJw== operator.openshift.io/dep-openshift-apiserver.etcd-client.secret: H-0Ygw== operator.openshift.io/dep-openshift-apiserver.etcd-serving-ca.configmap: HOMAdQ== operator.openshift.io/dep-openshift-apiserver.image-import-ca.configmap: OUXnWA== operator.openshift.io/dep-openshift-apiserver.trusted-ca-bundle.configmap: ElMHxA== creationTimestamp: "2025-10-11T10:44:19Z" generateName: apiserver-8865994fd- labels: apiserver: "true" app: openshift-apiserver-a openshift-apiserver-anti-affinity: "true" pod-template-hash: 8865994fd revision: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:operator.openshift.io/dep-desired.generation: {} f:operator.openshift.io/dep-openshift-apiserver.config.configmap: {} f:operator.openshift.io/dep-openshift-apiserver.etcd-client.secret: {} f:operator.openshift.io/dep-openshift-apiserver.etcd-serving-ca.configmap: {} f:operator.openshift.io/dep-openshift-apiserver.image-import-ca.configmap: {} f:operator.openshift.io/dep-openshift-apiserver.trusted-ca-bundle.configmap: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:apiserver: {} f:app: {} f:openshift-apiserver-anti-affinity: {} f:pod-template-hash: {} f:revision: {} f:ownerReferences: .: {} k:{"uid":"5362ab34-28a5-48f5-a081-2afa1dc88adb"}: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"openshift-apiserver"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"POD_NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsUser: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/lib/kubelet/"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/log/openshift-apiserver"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/audit"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/etcd-serving-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/image-import-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/trusted-ca-bundle"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/encryption-config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/etcd-client"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} k:{"name":"openshift-apiserver-check-endpoints"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"POD_NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":17698,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:initContainers: .: {} k:{"name":"fix-audit-permissions"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:runAsUser: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/log/openshift-apiserver"}: .: {} f:mountPath: {} f:name: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"audit"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"audit-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"encryption-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"etcd-client"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"etcd-serving-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"image-import-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:optional: {} f:name: {} k:{"name":"node-pullsecrets"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:optional: {} f:name: {} manager: kube-controller-manager operation: Update time: "2025-10-11T10:44:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: .: {} k:{"type":"PodScheduled"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:message: {} f:reason: {} f:status: {} f:type: {} manager: kube-scheduler operation: Update subresource: status time: "2025-10-11T10:44:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: master-2 operation: Update subresource: status time: "2025-10-11T10:46:19Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2025-10-11T10:46:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:initContainerStatuses: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.128.0.93"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2025-10-11T10:46:25Z" name: apiserver-8865994fd-5kbfp namespace: openshift-apiserver ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: apiserver-8865994fd uid: 5362ab34-28a5-48f5-a081-2afa1dc88adb resourceVersion: "24786" uid: 350b6f3e-a23f-426b-9923-b2a09914e0cb spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: apiserver: "true" app: openshift-apiserver-a openshift-apiserver-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - | if [ -s /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem ]; then echo "Copying system trust bundle" cp -f /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem fi exec openshift-apiserver start --config=/var/run/configmaps/config/config.yaml -v=2 command: - /bin/bash - -ec env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name - name: POD_NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: livez?exclude=etcd port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: openshift-apiserver ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: readyz?exclude=etcd&exclude=etcd-readiness port: 8443 scheme: HTTPS periodSeconds: 5 successThreshold: 1 timeoutSeconds: 10 resources: requests: cpu: 100m memory: 200Mi securityContext: privileged: true readOnlyRootFilesystem: false runAsUser: 0 startupProbe: failureThreshold: 30 httpGet: path: livez port: 8443 scheme: HTTPS periodSeconds: 5 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/lib/kubelet/ name: node-pullsecrets readOnly: true - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/audit name: audit - mountPath: /var/run/secrets/etcd-client name: etcd-client - mountPath: /var/run/configmaps/etcd-serving-ca name: etcd-serving-ca - mountPath: /var/run/configmaps/image-import-ca name: image-import-ca - mountPath: /var/run/configmaps/trusted-ca-bundle name: trusted-ca-bundle - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /var/run/secrets/encryption-config name: encryption-config - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-4lc8w readOnly: true - args: - --listen - 0.0.0.0:17698 - --namespace - $(POD_NAMESPACE) - --v - "2" command: - cluster-kube-apiserver-operator - check-endpoints env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name - name: POD_NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd52817806c4f947413297672397b0f17784eec91347b8d6f3a21f4b9921eb2e imagePullPolicy: IfNotPresent name: openshift-apiserver-check-endpoints ports: - containerPort: 17698 name: check-endpoints protocol: TCP resources: requests: cpu: 10m memory: 50Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-4lc8w readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: openshift-apiserver-sa-dockercfg-lntq9 initContainers: - command: - sh - -c - chmod 0700 /var/log/openshift-apiserver && touch /var/log/openshift-apiserver/audit.log && chmod 0600 /var/log/openshift-apiserver/* image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imagePullPolicy: IfNotPresent name: fix-audit-permissions resources: requests: cpu: 15m memory: 50Mi securityContext: privileged: true runAsUser: 0 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-4lc8w readOnly: true nodeName: master-2 nodeSelector: node-role.kubernetes.io/master: "" preemptionPolicy: PreemptLowerPriority priority: 2000001000 priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: openshift-apiserver-sa serviceAccountName: openshift-apiserver-sa terminationGracePeriodSeconds: 120 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node-role.kubernetes.io/control-plane operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - hostPath: path: /var/lib/kubelet/ type: Directory name: node-pullsecrets - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: audit-1 name: audit - name: etcd-client secret: defaultMode: 384 secretName: etcd-client - configMap: defaultMode: 420 name: etcd-serving-ca name: etcd-serving-ca - configMap: defaultMode: 420 name: image-import-ca optional: true name: image-import-ca - name: serving-cert secret: defaultMode: 384 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle optional: true name: trusted-ca-bundle - name: encryption-config secret: defaultMode: 384 optional: true secretName: encryption-config-1 - hostPath: path: /var/log/openshift-apiserver type: "" name: audit-dir - name: kube-api-access-4lc8w projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2025-10-11T10:46:20Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2025-10-11T10:46:20Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2025-10-11T10:46:25Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2025-10-11T10:46:25Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2025-10-11T10:46:19Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://87c8825568cdfb6d2376cb5c391bb4c4ab0b3ce29e33cc8ad53c772cb1884816 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 lastState: {} name: openshift-apiserver ready: true restartCount: 0 started: true state: running: startedAt: "2025-10-11T10:46:21Z" volumeMounts: - mountPath: /var/lib/kubelet/ name: node-pullsecrets readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/audit name: audit - mountPath: /var/run/secrets/etcd-client name: etcd-client - mountPath: /var/run/configmaps/etcd-serving-ca name: etcd-serving-ca - mountPath: /var/run/configmaps/image-import-ca name: image-import-ca - mountPath: /var/run/configmaps/trusted-ca-bundle name: trusted-ca-bundle - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /var/run/secrets/encryption-config name: encryption-config - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-4lc8w readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://2c4f4cf15af5c8df0b2d019e445fdf8dff21c6eb5222aff022c05b698c569fd0 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd52817806c4f947413297672397b0f17784eec91347b8d6f3a21f4b9921eb2e imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd52817806c4f947413297672397b0f17784eec91347b8d6f3a21f4b9921eb2e lastState: {} name: openshift-apiserver-check-endpoints ready: true restartCount: 0 started: true state: running: startedAt: "2025-10-11T10:46:21Z" volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-4lc8w readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.34.12 hostIPs: - ip: 192.168.34.12 initContainerStatuses: - containerID: cri-o://b89b5c0840c738481e8e36f4beb28c4d82117a8861c89ed1a8e99de967b8d99a image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 lastState: {} name: fix-audit-permissions ready: true restartCount: 0 started: false state: terminated: containerID: cri-o://b89b5c0840c738481e8e36f4beb28c4d82117a8861c89ed1a8e99de967b8d99a exitCode: 0 finishedAt: "2025-10-11T10:46:20Z" reason: Completed startedAt: "2025-10-11T10:46:20Z" volumeMounts: - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-4lc8w readOnly: true recursiveReadOnly: Disabled phase: Running podIP: 10.128.0.93 podIPs: - ip: 10.128.0.93 qosClass: Burstable startTime: "2025-10-11T10:46:19Z" - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.129.0.82/23"],"mac_address":"0a:58:0a:81:00:52","gateway_ips":["10.129.0.1"],"routes":[{"dest":"10.128.0.0/14","nextHop":"10.129.0.1"},{"dest":"172.30.0.0/16","nextHop":"10.129.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.129.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.129.0.1"}],"ip_address":"10.129.0.82/23","gateway_ip":"10.129.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.129.0.82" ], "mac": "0a:58:0a:81:00:52", "default": true, "dns": {} }] openshift.io/required-scc: privileged openshift.io/scc: privileged operator.openshift.io/dep-desired.generation: "6" operator.openshift.io/dep-openshift-apiserver.config.configmap: uJHjJw== operator.openshift.io/dep-openshift-apiserver.etcd-client.secret: H-0Ygw== operator.openshift.io/dep-openshift-apiserver.etcd-serving-ca.configmap: HOMAdQ== operator.openshift.io/dep-openshift-apiserver.image-import-ca.configmap: OUXnWA== operator.openshift.io/dep-openshift-apiserver.trusted-ca-bundle.configmap: ElMHxA== creationTimestamp: "2025-10-11T10:41:48Z" generateName: apiserver-8865994fd- labels: apiserver: "true" app: openshift-apiserver-a openshift-apiserver-anti-affinity: "true" pod-template-hash: 8865994fd revision: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:operator.openshift.io/dep-desired.generation: {} f:operator.openshift.io/dep-openshift-apiserver.config.configmap: {} f:operator.openshift.io/dep-openshift-apiserver.etcd-client.secret: {} f:operator.openshift.io/dep-openshift-apiserver.etcd-serving-ca.configmap: {} f:operator.openshift.io/dep-openshift-apiserver.image-import-ca.configmap: {} f:operator.openshift.io/dep-openshift-apiserver.trusted-ca-bundle.configmap: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:apiserver: {} f:app: {} f:openshift-apiserver-anti-affinity: {} f:pod-template-hash: {} f:revision: {} f:ownerReferences: .: {} k:{"uid":"5362ab34-28a5-48f5-a081-2afa1dc88adb"}: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"openshift-apiserver"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"POD_NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsUser: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/lib/kubelet/"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/log/openshift-apiserver"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/audit"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/etcd-serving-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/image-import-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/trusted-ca-bundle"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/encryption-config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/etcd-client"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} k:{"name":"openshift-apiserver-check-endpoints"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"POD_NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":17698,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:initContainers: .: {} k:{"name":"fix-audit-permissions"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:runAsUser: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/log/openshift-apiserver"}: .: {} f:mountPath: {} f:name: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"audit"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"audit-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"encryption-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"etcd-client"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"etcd-serving-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"image-import-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:optional: {} f:name: {} k:{"name":"node-pullsecrets"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:optional: {} f:name: {} manager: kube-controller-manager operation: Update time: "2025-10-11T10:41:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: .: {} k:{"type":"PodScheduled"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:message: {} f:reason: {} f:status: {} f:type: {} manager: kube-scheduler operation: Update subresource: status time: "2025-10-11T10:41:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: master-1 operation: Update subresource: status time: "2025-10-11T10:42:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2025-10-11T10:42:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:initContainerStatuses: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.129.0.82"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2025-10-11T10:42:13Z" name: apiserver-8865994fd-g2fnh namespace: openshift-apiserver ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: apiserver-8865994fd uid: 5362ab34-28a5-48f5-a081-2afa1dc88adb resourceVersion: "22306" uid: 6c9318b1-5be5-4254-8eb6-7cf411c02eb8 spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: apiserver: "true" app: openshift-apiserver-a openshift-apiserver-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - | if [ -s /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem ]; then echo "Copying system trust bundle" cp -f /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem fi exec openshift-apiserver start --config=/var/run/configmaps/config/config.yaml -v=2 command: - /bin/bash - -ec env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name - name: POD_NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: livez?exclude=etcd port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: openshift-apiserver ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: readyz?exclude=etcd&exclude=etcd-readiness port: 8443 scheme: HTTPS periodSeconds: 5 successThreshold: 1 timeoutSeconds: 10 resources: requests: cpu: 100m memory: 200Mi securityContext: privileged: true readOnlyRootFilesystem: false runAsUser: 0 startupProbe: failureThreshold: 30 httpGet: path: livez port: 8443 scheme: HTTPS periodSeconds: 5 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/lib/kubelet/ name: node-pullsecrets readOnly: true - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/audit name: audit - mountPath: /var/run/secrets/etcd-client name: etcd-client - mountPath: /var/run/configmaps/etcd-serving-ca name: etcd-serving-ca - mountPath: /var/run/configmaps/image-import-ca name: image-import-ca - mountPath: /var/run/configmaps/trusted-ca-bundle name: trusted-ca-bundle - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /var/run/secrets/encryption-config name: encryption-config - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nzqwt readOnly: true - args: - --listen - 0.0.0.0:17698 - --namespace - $(POD_NAMESPACE) - --v - "2" command: - cluster-kube-apiserver-operator - check-endpoints env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name - name: POD_NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd52817806c4f947413297672397b0f17784eec91347b8d6f3a21f4b9921eb2e imagePullPolicy: IfNotPresent name: openshift-apiserver-check-endpoints ports: - containerPort: 17698 name: check-endpoints protocol: TCP resources: requests: cpu: 10m memory: 50Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nzqwt readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: openshift-apiserver-sa-dockercfg-lntq9 initContainers: - command: - sh - -c - chmod 0700 /var/log/openshift-apiserver && touch /var/log/openshift-apiserver/audit.log && chmod 0600 /var/log/openshift-apiserver/* image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imagePullPolicy: IfNotPresent name: fix-audit-permissions resources: requests: cpu: 15m memory: 50Mi securityContext: privileged: true runAsUser: 0 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nzqwt readOnly: true nodeName: master-1 nodeSelector: node-role.kubernetes.io/master: "" preemptionPolicy: PreemptLowerPriority priority: 2000001000 priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: openshift-apiserver-sa serviceAccountName: openshift-apiserver-sa terminationGracePeriodSeconds: 120 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node-role.kubernetes.io/control-plane operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - hostPath: path: /var/lib/kubelet/ type: Directory name: node-pullsecrets - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: audit-1 name: audit - name: etcd-client secret: defaultMode: 384 secretName: etcd-client - configMap: defaultMode: 420 name: etcd-serving-ca name: etcd-serving-ca - configMap: defaultMode: 420 name: image-import-ca optional: true name: image-import-ca - name: serving-cert secret: defaultMode: 384 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle optional: true name: trusted-ca-bundle - name: encryption-config secret: defaultMode: 384 optional: true secretName: encryption-config-1 - hostPath: path: /var/log/openshift-apiserver type: "" name: audit-dir - name: kube-api-access-nzqwt projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2025-10-11T10:42:08Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2025-10-11T10:42:08Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2025-10-11T10:42:13Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2025-10-11T10:42:13Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2025-10-11T10:42:07Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://3d85f294797215e27e00a1deb2e17dd5dd10acdf5ffc31590c560bc071b3ebc4 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 lastState: {} name: openshift-apiserver ready: true restartCount: 0 started: true state: running: startedAt: "2025-10-11T10:42:08Z" volumeMounts: - mountPath: /var/lib/kubelet/ name: node-pullsecrets readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/audit name: audit - mountPath: /var/run/secrets/etcd-client name: etcd-client - mountPath: /var/run/configmaps/etcd-serving-ca name: etcd-serving-ca - mountPath: /var/run/configmaps/image-import-ca name: image-import-ca - mountPath: /var/run/configmaps/trusted-ca-bundle name: trusted-ca-bundle - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /var/run/secrets/encryption-config name: encryption-config - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nzqwt readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://aa5cf014d215a1dcd8c5faa8044bde8a201a3720fd928755ca335ca36d17fdf2 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd52817806c4f947413297672397b0f17784eec91347b8d6f3a21f4b9921eb2e imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd52817806c4f947413297672397b0f17784eec91347b8d6f3a21f4b9921eb2e lastState: {} name: openshift-apiserver-check-endpoints ready: true restartCount: 0 started: true state: running: startedAt: "2025-10-11T10:42:09Z" volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nzqwt readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.34.11 hostIPs: - ip: 192.168.34.11 initContainerStatuses: - containerID: cri-o://f8c9b4d02496959e8fb124becb7d2c60f0137dcae9fa68835aac05f51b1df52b image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db6d4edac103c373eb6bee221074d39e3707377b4d26444e98afb1a1363b3cb7 lastState: {} name: fix-audit-permissions ready: true restartCount: 0 started: false state: terminated: containerID: cri-o://f8c9b4d02496959e8fb124becb7d2c60f0137dcae9fa68835aac05f51b1df52b exitCode: 0 finishedAt: "2025-10-11T10:42:08Z" reason: Completed startedAt: "2025-10-11T10:42:08Z" volumeMounts: - mountPath: /var/log/openshift-apiserver name: audit-dir - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-nzqwt readOnly: true recursiveReadOnly: Disabled phase: Running podIP: 10.129.0.82 podIPs: - ip: 10.129.0.82 qosClass: Burstable startTime: "2025-10-11T10:42:07Z" kind: PodList metadata: resourceVersion: "64876"