insights-operator/gathers.json0000640000000000000000000003523015147061712015260 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/tsdb_status","duration_in_ms":29,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":30,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":65,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":67,"records_count":6,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":116,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":32,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":66,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":4,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":51,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":129,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":289,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":35,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":52,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":35,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":34,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":65,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":124,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":29,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":63118,"records_count":0,"errors":["the server was unable to return a response in the time allotted, but may still be processing the request"],"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":401366,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":452291,"records_count":51,"errors":["the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-fpwtm.json\" was already recorded and had the fingerprint \"03a4f667bccfd620017327ae9dbad8b2b01c4ed4eaefedce54dc05aa622f7ffc\", overwriting with the record having fingerprint \"fa6c80f5ace42367c71e57eac44b48a5901dadacfa94aa0b628f697c51420155\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_previous.log\" was already recorded and had the fingerprint \"d2b57ab79a70ff847fa389538395ad4231936bf5fadcc125b04d8b76fef9aed3\", overwriting with the record having fingerprint \"d2b57ab79a70ff847fa389538395ad4231936bf5fadcc125b04d8b76fef9aed3\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_current.log\" was already recorded and had the fingerprint \"bd1eee97c2ad30b236f4c420fbcf8c7c42b5ed07763b633a61a569efdfad4b40\", overwriting with the record having fingerprint \"bd1eee97c2ad30b236f4c420fbcf8c7c42b5ed07763b633a61a569efdfad4b40\""],"warnings":["warning: the record with the same fingerprint \"d2b57ab79a70ff847fa389538395ad4231936bf5fadcc125b04d8b76fef9aed3\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"bd1eee97c2ad30b236f4c420fbcf8c7c42b5ed07763b633a61a569efdfad4b40\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_current.log\""],"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":29,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":29,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":69,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":115,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5140,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":32,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":68,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":69,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":75,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":223,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":51,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":65,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":67,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":131,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":452299,"records_count":129,"errors":["function \"machine_autoscalers\" failed with an error","function \"tsdb_status\" failed with an error","function \"active_alerts\" failed with an error","function \"metrics\" failed with an error","function \"silenced_alerts\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"install_plans\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-fpwtm.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":102,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":105,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":118,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5139,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":35,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":75,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":119,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":52,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":66,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":177,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":31,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":72,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":69,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":458.31,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515147061712017766 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515147061712021070 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005052415147061711014246 0ustar0000000000000000{"pods":74,"imageCount":61,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:c2af15d278f72034eecf3db74223b7e61f3d07c1a5c7ba760e7586915ff1b17e","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:6c7ec917f0eff7b41d7174f1b5fdc4ce53ad106e51599afba731a8431ff9caa7","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:b5385b46d054c9ee73478bf23e07056d0b9f81d34619d0949927d8d9e791fcb5","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:6c7ec917f0eff7b41d7174f1b5fdc4ce53ad106e51599afba731a8431ff9caa7","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:518982b9ad8a8bfb7bb3b4216b235cac99e126df3bb48e390b36064560c76b83","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:6c7ec917f0eff7b41d7174f1b5fdc4ce53ad106e51599afba731a8431ff9caa7","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:584b5d125dad1fa4f8d03e6ace2e4901c173569ff1ed9536da6915c56fa52bc0","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:6c7ec917f0eff7b41d7174f1b5fdc4ce53ad106e51599afba731a8431ff9caa7","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a1b426a276216372c7d688fe60e9eaf251efd35071f94e1bcd4337f51a90fd75","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"terminalCount":1,"shapes":[]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ff40a2d97bf7a95e19303f7e972b7e8354a3864039111c6d33d5479117aaeed","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ebf883de8fd905490f0c9b420a5d6446ecde18e12e15364f6dcd4e885104972c","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"ignoredCount":1,"shapes":[]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:572b0ca6e993beea2ee9346197665e56a2e4999fbb6958c747c48a35bf72ee34","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":3,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":2,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c","firstArg":"aZFPdeh8u0QY"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f86073cf0561e4b69668f8917ef5184cb0ef5aa16d0fefe38118f1167b268721","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011621515147061704033441 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-65c9585877-m66zh2026-02-23T14:23:41.243836982Z E0223 14:23:41.243799 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:41.243898053Z E0223 14:23:41.243854 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:41.244131260Z E0223 14:23:41.244099 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:41.244141400Z E0223 14:23:41.244132 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:41.385070787Z E0223 14:23:41.385008 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:41.390894601Z E0223 14:23:41.390840 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:56.151561874Z E0223 14:23:56.151437 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:56.151625986Z E0223 14:23:56.151593 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:56.151697268Z E0223 14:23:56.151637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:56.155864808Z E0223 14:23:56.155754 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:23:56.155919590Z E0223 14:23:56.155879 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:11.253679206Z E0223 14:24:11.251291 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:11.253679206Z E0223 14:24:11.251653 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:11.253679206Z E0223 14:24:11.251827 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:11.253679206Z E0223 14:24:11.252026 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:11.253679206Z E0223 14:24:11.252462 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:20.677357086Z W0223 14:24:20.677251 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.117.209:50051: connect: connection refused" 2026-02-23T14:24:26.158931489Z E0223 14:24:26.158821 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:26.158931489Z E0223 14:24:26.158903 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:26.159060642Z E0223 14:24:26.158903 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:26.159235086Z E0223 14:24:26.159174 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:26.159444642Z E0223 14:24:26.159182 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:41.246690406Z E0223 14:24:41.246627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:41.247104617Z E0223 14:24:41.246902 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:41.247104617Z E0223 14:24:41.247077 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:41.247306302Z E0223 14:24:41.247265 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:41.247319952Z E0223 14:24:41.247309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:41.393105751Z E0223 14:24:41.393033 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:41.402065152Z E0223 14:24:41.401993 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:42.930838415Z W0223 14:24:42.930776 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.118.97:50051: connect: connection refused" 2026-02-23T14:24:49.473542727Z W0223 14:24:49.473429 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.151.152:50051: connect: connection refused" 2026-02-23T14:24:52.613786451Z W0223 14:24:52.613713 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.231.132:50051: connect: connection refused" 2026-02-23T14:24:56.169331155Z E0223 14:24:56.169236 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:56.169331155Z E0223 14:24:56.169267 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:56.169331155Z E0223 14:24:56.169267 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:56.173667377Z E0223 14:24:56.173310 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:56.173667377Z E0223 14:24:56.173604 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.255273242Z E0223 14:25:11.255194 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.255273242Z E0223 14:25:11.255215 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.255603181Z E0223 14:25:11.255551 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.255640122Z E0223 14:25:11.255590 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.255819206Z E0223 14:25:11.255737 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:26.183366820Z E0223 14:25:26.183272 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:26.183940785Z E0223 14:25:26.183435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:26.183940785Z E0223 14:25:26.183543 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:26.183940785Z E0223 14:25:26.183716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:26.183940785Z E0223 14:25:26.183716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.249883719Z E0223 14:25:41.249781 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.251882301Z E0223 14:25:41.250372 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.251882301Z E0223 14:25:41.250842 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.251882301Z E0223 14:25:41.251209 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.251882301Z E0223 14:25:41.251632 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.347830807Z E0223 14:25:41.347747 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.356533571Z E0223 14:25:41.356472 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:56.192559300Z E0223 14:25:56.192398 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:56.192559300Z E0223 14:25:56.192440 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:56.192559300Z E0223 14:25:56.192522 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:56.192657663Z E0223 14:25:56.192548 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:56.192657663Z E0223 14:25:56.192595 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:10.821004114Z W0223 14:26:10.820914 1 logging.go:55] [core] [Channel #4 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.117.209:50051: connect: connection refused" 2026-02-23T14:26:11.272728851Z E0223 14:26:11.272637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.272929236Z E0223 14:26:11.272886 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.274627430Z E0223 14:26:11.274577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.274627430Z E0223 14:26:11.274594 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.274974109Z E0223 14:26:11.274910 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:20.167005675Z time="2026-02-23T14:26:20Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-02-23T14:26:20.167005675Z time="2026-02-23T14:26:20Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.117.209:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-02-23T14:26:20.168593198Z time="2026-02-23T14:26:20Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-02-23T14:26:20.168593198Z time="2026-02-23T14:26:20Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.231.132:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-02-23T14:26:22.925795886Z time="2026-02-23T14:26:22Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-02-23T14:26:22.925846437Z time="2026-02-23T14:26:22Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.151.152:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-02-23T14:26:22.930820931Z time="2026-02-23T14:26:22Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-02-23T14:26:22.930870462Z time="2026-02-23T14:26:22Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.118.97:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-02-23T14:26:26.196444094Z E0223 14:26:26.196367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:26.197121883Z E0223 14:26:26.197050 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:26.197121883Z E0223 14:26:26.197084 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:26.197227446Z E0223 14:26:26.197059 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:26.197777900Z E0223 14:26:26.197670 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:35.444983339Z W0223 14:26:35.444865 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.118.97:50051: connect: connection refused" 2026-02-23T14:26:41.256585568Z E0223 14:26:41.254889 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.256585568Z E0223 14:26:41.254929 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.256585568Z E0223 14:26:41.255131 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.256585568Z E0223 14:26:41.255259 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.256585568Z E0223 14:26:41.255364 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.264433729Z E0223 14:26:41.264132 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.271378206Z E0223 14:26:41.271030 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.394392950Z E0223 14:26:41.394314 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.401630114Z E0223 14:26:41.401548 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:50.111208310Z W0223 14:26:50.111096 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.151.152:50051: connect: connection refused" 2026-02-23T14:26:56.208747938Z E0223 14:26:56.208186 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:56.208747938Z E0223 14:26:56.208312 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:56.208747938Z E0223 14:26:56.208185 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:56.208747938Z E0223 14:26:56.208524 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:56.208747938Z E0223 14:26:56.208571 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:02.463373137Z W0223 14:27:02.463241 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.231.132:50051: connect: connection refused" 2026-02-23T14:27:11.245089650Z E0223 14:27:11.244407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.245089650Z E0223 14:27:11.244443 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.245089650Z E0223 14:27:11.244461 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.245089650Z E0223 14:27:11.244742 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.245089650Z E0223 14:27:11.244820 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000000431415147061704036765 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-cj2l72026-02-23T14:26:02.311535986Z 2026-02-23T14:26:02Z ERROR setup unable to get cluster infrastructure status, using HA cluster values for leader election {"error": "Get \"https://172.30.0.1:443/apis/config.openshift.io/v1/infrastructures/cluster\": context deadline exceeded"} 2026-02-23T14:26:02.311535986Z github.com/openshift/operator-framework-olm/pkg/leaderelection.getLeaderElectionConfig 2026-02-23T14:26:02.311535986Z /build/pkg/leaderelection/leaderelection.go:61 2026-02-23T14:26:02.311535986Z github.com/openshift/operator-framework-olm/pkg/leaderelection.GetLeaderElectionConfig 2026-02-23T14:26:02.311535986Z /build/pkg/leaderelection/leaderelection.go:50 2026-02-23T14:26:02.311535986Z main.run 2026-02-23T14:26:02.311535986Z /build/cmd/package-server-manager/main.go:83 2026-02-23T14:26:02.311535986Z github.com/spf13/cobra.(*Command).execute 2026-02-23T14:26:02.311535986Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-02-23T14:26:02.311535986Z github.com/spf13/cobra.(*Command).ExecuteC 2026-02-23T14:26:02.311535986Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-02-23T14:26:02.311535986Z github.com/spf13/cobra.(*Command).Execute 2026-02-23T14:26:02.311535986Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-02-23T14:26:02.311535986Z main.main 2026-02-23T14:26:02.311535986Z /build/cmd/package-server-manager/main.go:43 2026-02-23T14:26:02.311535986Z runtime.main 2026-02-23T14:26:02.311535986Z /usr/lib/golang/src/runtime/proc.go:271 2026-02-23T14:26:02.365410102Z 2026-02-23T14:26:02Z INFO setup starting manager 2026-02-23T14:26:02.367181597Z 2026-02-23T14:26:02Z INFO controller-runtime.metrics Starting metrics server 2026-02-23T14:26:02.367450024Z 2026-02-23T14:26:02Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-23T14:26:02.367911986Z 2026-02-23T14:26:02Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-23T14:26:02.368784159Z 2026-02-23T14:26:02Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-23T14:26:02.369041475Z I0223 14:26:02.368980 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... kube-rbac-proxy_current.log0000640000000000000000000000160415147061704035467 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-cj2l72026-02-23T14:19:06.953965103Z W0223 14:19:06.953782 1 deprecated.go:66] 2026-02-23T14:19:06.953965103Z ==== Removed Flag Warning ====================== 2026-02-23T14:19:06.953965103Z 2026-02-23T14:19:06.953965103Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-23T14:19:06.953965103Z 2026-02-23T14:19:06.953965103Z =============================================== 2026-02-23T14:19:06.953965103Z 2026-02-23T14:19:06.954359502Z I0223 14:19:06.954337 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-23T14:19:06.955805363Z I0223 14:19:06.955781 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-23T14:19:06.956300234Z I0223 14:19:06.956267 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-23T14:19:06.956797565Z I0223 14:19:06.956774 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 package-server-manager_previous.log0000640000000000000000000003660215147061704037164 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-cj2l72026-02-23T14:19:15.954016132Z 2026-02-23T14:19:15Z INFO setup starting manager 2026-02-23T14:19:15.956708470Z 2026-02-23T14:19:15Z INFO controller-runtime.metrics Starting metrics server 2026-02-23T14:19:15.957308733Z 2026-02-23T14:19:15Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-23T14:19:15.957758743Z 2026-02-23T14:19:15Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-23T14:19:15.957807704Z 2026-02-23T14:19:15Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-23T14:19:15.960390760Z I0223 14:19:15.960324 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-23T14:19:15.984737304Z I0223 14:19:15.984689 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-02-23T14:19:15.985166794Z 2026-02-23T14:19:15Z DEBUG events package-server-manager-5c75f78c8b-cj2l7_fb5a8178-c357-40da-9fca-288eaa4f0e09 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"5d16287c-141f-4c81-9bc0-becfdbb95687","apiVersion":"coordination.k8s.io/v1","resourceVersion":"6900"}, "reason": "LeaderElection"} 2026-02-23T14:19:15.986460571Z 2026-02-23T14:19:15Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-02-23T14:19:15.986460571Z 2026-02-23T14:19:15Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-02-23T14:19:15.986492652Z 2026-02-23T14:19:15Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-23T14:19:16.097035064Z 2026-02-23T14:19:16Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-02-23T14:19:16.101073221Z 2026-02-23T14:19:16Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-02-23T14:19:16.101260625Z 2026-02-23T14:19:16Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T14:19:16.101260625Z 2026-02-23T14:19:16Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:16.410735803Z 2026-02-23T14:19:16Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:16.410735803Z 2026-02-23T14:19:16Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T14:19:16.443721513Z 2026-02-23T14:19:16Z INFO controllers.packageserver attempting to create the packageserver csv 2026-02-23T14:19:16.453506874Z 2026-02-23T14:19:16Z INFO controllers.packageserver updating csv spec 2026-02-23T14:19:16.477985772Z 2026-02-23T14:19:16Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-02-23T14:19:16.477985772Z 2026-02-23T14:19:16Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:16.478129545Z 2026-02-23T14:19:16Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T14:19:16.478129545Z 2026-02-23T14:19:16Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:16.486509485Z 2026-02-23T14:19:16Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:16.486509485Z 2026-02-23T14:19:16Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T14:19:16.498504964Z 2026-02-23T14:19:16Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T14:19:16.498504964Z 2026-02-23T14:19:16Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:31.522158532Z 2026-02-23T14:19:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T14:19:31.522158532Z 2026-02-23T14:19:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:31.522201743Z 2026-02-23T14:19:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:31.522209573Z 2026-02-23T14:19:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T14:19:31.548734185Z 2026-02-23T14:19:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T14:19:31.548734185Z 2026-02-23T14:19:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:31.601327728Z 2026-02-23T14:19:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T14:19:31.601327728Z 2026-02-23T14:19:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:31.601355149Z 2026-02-23T14:19:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:31.601393319Z 2026-02-23T14:19:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T14:19:31.653087903Z 2026-02-23T14:19:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T14:19:31.653157535Z 2026-02-23T14:19:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:31.692354559Z 2026-02-23T14:19:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T14:19:31.692354559Z 2026-02-23T14:19:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:31.692354559Z 2026-02-23T14:19:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:31.692354559Z 2026-02-23T14:19:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T14:19:31.708402135Z 2026-02-23T14:19:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T14:19:31.708402135Z 2026-02-23T14:19:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:32.285270484Z 2026-02-23T14:19:32Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T14:19:32.285270484Z 2026-02-23T14:19:32Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:32.285306415Z 2026-02-23T14:19:32Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:32.285306415Z 2026-02-23T14:19:32Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T14:19:32.295566446Z 2026-02-23T14:19:32Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T14:19:32.295566446Z 2026-02-23T14:19:32Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:32.907748125Z 2026-02-23T14:19:32Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T14:19:32.907748125Z 2026-02-23T14:19:32Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:32.907748125Z 2026-02-23T14:19:32Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:32.907748125Z 2026-02-23T14:19:32Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T14:19:32.934907430Z 2026-02-23T14:19:32Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T14:19:32.934907430Z 2026-02-23T14:19:32Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:33.378404535Z 2026-02-23T14:19:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-23T14:19:33.378404535Z 2026-02-23T14:19:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:33.378437296Z 2026-02-23T14:19:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:19:33.378465866Z 2026-02-23T14:19:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-23T14:19:33.406816777Z 2026-02-23T14:19:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-23T14:19:33.406816777Z 2026-02-23T14:19:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-23T14:20:50.003205598Z E0223 14:20:50.003100 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-23T14:21:50.006060917Z E0223 14:21:50.005981 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-02-23T14:23:24.014962254Z E0223 14:23:24.014856 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-23T14:24:15.996196796Z E0223 14:24:15.996092 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-operator-lifecycle-manager/leases/packageserver-controller-lock": context deadline exceeded 2026-02-23T14:24:15.996196796Z I0223 14:24:15.996154 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition 2026-02-23T14:24:50.002200592Z E0223 14:24:50.001851 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-23T14:24:50.002200592Z 2026-02-23T14:24:50Z ERROR setup problem running manager {"error": "leader election lost"} 2026-02-23T14:24:50.002200592Z main.run 2026-02-23T14:24:50.002200592Z /build/cmd/package-server-manager/main.go:150 2026-02-23T14:24:50.002200592Z github.com/spf13/cobra.(*Command).execute 2026-02-23T14:24:50.002200592Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-02-23T14:24:50.002200592Z github.com/spf13/cobra.(*Command).ExecuteC 2026-02-23T14:24:50.002200592Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-02-23T14:24:50.002200592Z github.com/spf13/cobra.(*Command).Execute 2026-02-23T14:24:50.002200592Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-02-23T14:24:50.002200592Z main.main 2026-02-23T14:24:50.002200592Z /build/cmd/package-server-manager/main.go:43 2026-02-23T14:24:50.002200592Z runtime.main 2026-02-23T14:24:50.002200592Z /usr/lib/golang/src/runtime/proc.go:271 2026-02-23T14:24:50.002200592Z Error: leader election lost 2026-02-23T14:24:50.002200592Z encountered an error while executing the binary: leader election lost config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-cj2l7.json0000640000000000000000000002326715147061704030227 0ustar0000000000000000{"metadata":{"name":"package-server-manager-5c75f78c8b-cj2l7","generateName":"package-server-manager-5c75f78c8b-","namespace":"openshift-operator-lifecycle-manager","uid":"5b54fc16-d2f7-4b10-a611-5b411b389c5a","resourceVersion":"9752","creationTimestamp":"2026-02-23T14:17:05Z","labels":{"app":"package-server-manager","pod-template-hash":"5c75f78c8b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"package-server-manager-5c75f78c8b","uid":"418e5a1f-c1f3-4dac-945b-cec04b28c845","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"package-server-manager-serving-cert","secret":{"secretName":"package-server-manager-serving-cert","defaultMode":420}},{"name":"kube-api-access-d5f8j","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://127.0.0.1:9090/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--logtostderr=true"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-d5f8j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}},{"name":"package-server-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","command":["/bin/psm","start"],"args":["--name","$(PACKAGESERVER_NAME)","--namespace","$(PACKAGESERVER_NAMESPACE)","--metrics=:9090"],"env":[{"name":"PACKAGESERVER_NAME","value":"packageserver"},{"name":"PACKAGESERVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7"},{"name":"PACKAGESERVER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"GOMEMLIMIT","value":"5MiB"}],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"kube-api-access-d5f8j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:26:30Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:26:30Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-02-23T14:18:19Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-23T14:19:06Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://d6900766f82c9e206cd3e7039baaa2878e6511f4627d07a00a47ed50496678b9","started":true,"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-d5f8j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"package-server-manager","state":{"running":{"startedAt":"2026-02-23T14:25:59Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"e-manager\"}}\nE0223 14:20:50.003100 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0223 14:21:50.005981 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock)\nE0223 14:23:24.014856 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0223 14:24:15.996092 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-operator-lifecycle-manager/leases/packageserver-controller-lock\": context deadline exceeded\nI0223 14:24:15.996154 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition\nE0223 14:24:50.001851 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\n2026-02-23T14:24:50Z\tERROR\tsetup\tproblem running manager\t{\"error\": \"leader election lost\"}\nmain.run\n\t/build/cmd/package-server-manager/main.go:150\ngithub.com/spf13/cobra.(*Command).execute\n\t/build/vendor/github.com/spf13/cobra/command.go:985\ngithub.com/spf13/cobra.(*Command).ExecuteC\n\t/build/vendor/github.com/spf13/cobra/command.go:1117\ngithub.com/spf13/cobra.(*Command).Execute\n\t/build/vendor/github.com/spf13/cobra/command.go:1041\nmain.main\n\t/build/cmd/package-server-manager/main.go:43\nruntime.main\n\t/usr/lib/golang/src/runtime/proc.go:271\nError: leader election lost\nencountered an error while executing the binary: leader election lost\n","startedAt":"2026-02-23T14:19:15Z","finishedAt":"2026-02-23T14:24:50Z","containerID":"cri-o://3e43920c8c9e66c01584e52a234477388c129ea94fe151ecc6c23098a8981522"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","containerID":"cri-o://d129e9b13c717050b25d9d0f6e17182a80ea8a33b9d790e963d24636d1efd35e","started":true,"volumeMounts":[{"name":"kube-api-access-d5f8j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}olm-operator_current.log0000640000000000000000000005371415147061704033277 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5499d7f7bb-t45zz2026-02-23T14:19:37.957621476Z time="2026-02-23T14:19:37Z" level=info msg="install strategy successful" csv=packageserver id=aojj4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.057520119Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=yDBpe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.157865551Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=Rg3gP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.256939185Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=1b/34 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.357743597Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=alDYq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.458070659Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=egVSX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.560279931Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=d4vjs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.657888564Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=Y+db8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.757651674Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=tN302 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.857275780Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=vUnB2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:38.957935779Z time="2026-02-23T14:19:38Z" level=info msg="install strategy successful" csv=packageserver id=adnFk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.057872462Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=SpwVW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.157622481Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=+l3hP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.258261030Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=picIF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.358190883Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=+frjh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.461136271Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=Y6LJv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.557026957Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=XhJfU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.657638264Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=9VsEJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.757364023Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=mfG5q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.856783424Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=WWEan namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:39.957556975Z time="2026-02-23T14:19:39Z" level=info msg="install strategy successful" csv=packageserver id=X7WuF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.057217953Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=09Vz4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.266468271Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=xo4+M namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.366273621Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=0iAZH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.373240392Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=iMIGx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.457731952Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=za5Vu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.557557683Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=pbVRe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.657906085Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=gtE+q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.758248587Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=VpKhL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.858046127Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=Cncgq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:40.957162623Z time="2026-02-23T14:19:40Z" level=info msg="install strategy successful" csv=packageserver id=x49kS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.057933124Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=ycohC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.261183653Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=r0KKv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.689024341Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=6yh6l namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.695317927Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=AGfwR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.701144612Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=+QnGE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.708239965Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=I1s0W namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.713825385Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=nLLGA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.958451036Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=EhOuk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.976201658Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=WawKI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:41.982776340Z time="2026-02-23T14:19:41Z" level=info msg="install strategy successful" csv=packageserver id=o+4WX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:42.125888824Z time="2026-02-23T14:19:42Z" level=info msg="install strategy successful" csv=packageserver id=jxiA/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:42.158944666Z time="2026-02-23T14:19:42Z" level=info msg="install strategy successful" csv=packageserver id=KdYzG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:42.257029149Z time="2026-02-23T14:19:42Z" level=info msg="install strategy successful" csv=packageserver id=UOzFb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:42.358211819Z time="2026-02-23T14:19:42Z" level=info msg="install strategy successful" csv=packageserver id=HtsRM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:42.458230404Z time="2026-02-23T14:19:42Z" level=info msg="install strategy successful" csv=packageserver id=foEPz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:42.557466482Z time="2026-02-23T14:19:42Z" level=info msg="install strategy successful" csv=packageserver id=7iRNN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:42.659728515Z time="2026-02-23T14:19:42Z" level=info msg="install strategy successful" csv=packageserver id=t/DxM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:42.791447703Z time="2026-02-23T14:19:42Z" level=info msg="install strategy successful" csv=packageserver id=fF6ui namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:43.058407665Z time="2026-02-23T14:19:43Z" level=info msg="install strategy successful" csv=packageserver id=cEpZ+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:43.152787449Z time="2026-02-23T14:19:43Z" level=info msg="install strategy successful" csv=packageserver id=3q0uz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:43.594112266Z time="2026-02-23T14:19:43Z" level=info msg="install strategy successful" csv=packageserver id=kmxis namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:43.833557285Z time="2026-02-23T14:19:43Z" level=info msg="install strategy successful" csv=packageserver id=L4qrD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:43.929599425Z time="2026-02-23T14:19:43Z" level=info msg="install strategy successful" csv=packageserver id=L1/it namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.028834203Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=5f0N/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.134140562Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=s3DJG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.251751036Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=nCaIN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.336660765Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=W7iNB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.443572438Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=ZLp3k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.559038896Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=gXHkv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.645552080Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=wZFJF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.742207253Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=o1pxg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.844422565Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=GIj+8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:44.946975905Z time="2026-02-23T14:19:44Z" level=info msg="install strategy successful" csv=packageserver id=dLKDL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.044929695Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=TZE5W namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.143899747Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=+tbTm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.247044190Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=6R1Mm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.278062268Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=vmuPl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.283105727Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=UK6jZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.301451402Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=dio5E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.309217489Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=rUIzR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.316561338Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=tHRI8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.322821932Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=CrEz9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.337683203Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=YFsyD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.358726126Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=hZRr4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.463944933Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=4jZal namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.563004967Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=ITXv5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.662900500Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=EmNdA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:45.907004759Z time="2026-02-23T14:19:45Z" level=info msg="install strategy successful" csv=packageserver id=xe5Lr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.078940744Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=vhsrI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.246841631Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=NDtsn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.347601802Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=Cf7+k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.355010232Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=mP/qE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.360538841Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=mEgJK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.446673917Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=kAO/S namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.478094384Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=OaqVd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.558297422Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=lpSXC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.657036789Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=qdukw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.757488743Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=+8aVS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.861024284Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=7X1hC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:19:46.963432870Z time="2026-02-23T14:19:46Z" level=info msg="install strategy successful" csv=packageserver id=xloy1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:20:47.009600735Z time="2026-02-23T14:20:47Z" level=info msg="install strategy successful" csv=packageserver id=LCnZU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-23T14:21:47.012999879Z time="2026-02-23T14:21:47Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator 2026-02-23T14:21:47.014377191Z time="2026-02-23T14:21:47Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" 2026-02-23T14:24:36.695768928Z time="2026-02-23T14:24:36Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator 2026-02-23T14:24:36.695972393Z time="2026-02-23T14:24:36Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" 2026-02-23T14:25:36.698021433Z time="2026-02-23T14:25:36Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator 2026-02-23T14:25:36.698021433Z time="2026-02-23T14:25:36Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" 2026-02-23T14:26:36.700033130Z time="2026-02-23T14:26:36Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" 2026-02-23T14:26:36.700033130Z time="2026-02-23T14:26:36Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator catalog-operator_current.log0000640000000000000000000005736215147061704035123 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-596f79dd6f-mhzxn2026-02-23T14:27:07.230154650Z time="2026-02-23T14:27:07Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=SsGU+ 2026-02-23T14:27:07.230154650Z time="2026-02-23T14:27:07Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=SsGU+ 2026-02-23T14:27:07.828516812Z time="2026-02-23T14:27:07Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Y+c6k 2026-02-23T14:27:07.828516812Z time="2026-02-23T14:27:07Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-tl6dk current-pod.namespace=openshift-marketplace id=Y+c6k 2026-02-23T14:27:07.828516812Z time="2026-02-23T14:27:07Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-tl6dk current-pod.namespace=openshift-marketplace id=Y+c6k 2026-02-23T14:27:07.828516812Z time="2026-02-23T14:27:07Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Y+c6k 2026-02-23T14:27:07.828516812Z time="2026-02-23T14:27:07Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Y+c6k 2026-02-23T14:27:07.828516812Z time="2026-02-23T14:27:07Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:07.828516812Z time="2026-02-23T14:27:07Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:08.427719307Z time="2026-02-23T14:27:08Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=SsGU+ 2026-02-23T14:27:08.427824410Z time="2026-02-23T14:27:08Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cdrlk current-pod.namespace=openshift-marketplace id=SsGU+ 2026-02-23T14:27:08.427824410Z time="2026-02-23T14:27:08Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cdrlk current-pod.namespace=openshift-marketplace id=SsGU+ 2026-02-23T14:27:08.427930572Z time="2026-02-23T14:27:08Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=SsGU+ 2026-02-23T14:27:08.427930572Z time="2026-02-23T14:27:08Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=SsGU+ 2026-02-23T14:27:08.427999014Z time="2026-02-23T14:27:08Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:08.428013075Z time="2026-02-23T14:27:08Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:08.642917287Z time="2026-02-23T14:27:08Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:08.643151923Z time="2026-02-23T14:27:08Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-pfb9h current-pod.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:08.643151923Z time="2026-02-23T14:27:08Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-pfb9h current-pod.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:08.643151923Z time="2026-02-23T14:27:08Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=4eyBI 2026-02-23T14:27:08.643151923Z time="2026-02-23T14:27:08Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:08.643164604Z time="2026-02-23T14:27:08Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:09.228529266Z time="2026-02-23T14:27:09Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:09.228697061Z time="2026-02-23T14:27:09Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-fjpvt current-pod.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:09.228697061Z time="2026-02-23T14:27:09Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-fjpvt current-pod.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:09.228736072Z time="2026-02-23T14:27:09Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=8BSGv 2026-02-23T14:27:09.228736072Z time="2026-02-23T14:27:09Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:09.228736072Z time="2026-02-23T14:27:09Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:09.937571311Z time="2026-02-23T14:27:09Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:09.937571311Z time="2026-02-23T14:27:09Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-pfb9h current-pod.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:09.937571311Z time="2026-02-23T14:27:09Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-pfb9h current-pod.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:09.937571311Z time="2026-02-23T14:27:09Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:09.937571311Z time="2026-02-23T14:27:09Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=4eyBI 2026-02-23T14:27:09.937571311Z time="2026-02-23T14:27:09Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:09.937571311Z time="2026-02-23T14:27:09Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:10.428713173Z time="2026-02-23T14:27:10Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:10.428749354Z time="2026-02-23T14:27:10Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-fjpvt current-pod.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:10.428749354Z time="2026-02-23T14:27:10Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-fjpvt current-pod.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:10.428906368Z time="2026-02-23T14:27:10Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:10.428906368Z time="2026-02-23T14:27:10Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=8BSGv 2026-02-23T14:27:10.428906368Z time="2026-02-23T14:27:10Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:10.428906368Z time="2026-02-23T14:27:10Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:10.629781954Z time="2026-02-23T14:27:10Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:10.630258527Z time="2026-02-23T14:27:10Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-tl6dk current-pod.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:10.630325708Z time="2026-02-23T14:27:10Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-tl6dk current-pod.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:10.630415861Z time="2026-02-23T14:27:10Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=D5bE0 2026-02-23T14:27:10.630460012Z time="2026-02-23T14:27:10Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:10.630551134Z time="2026-02-23T14:27:10Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:11.229341997Z time="2026-02-23T14:27:11Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:11.229341997Z time="2026-02-23T14:27:11Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cdrlk current-pod.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:11.229341997Z time="2026-02-23T14:27:11Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cdrlk current-pod.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:11.229341997Z time="2026-02-23T14:27:11Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=w1ot4 2026-02-23T14:27:11.229341997Z time="2026-02-23T14:27:11Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:11.229341997Z time="2026-02-23T14:27:11Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:11.828652194Z time="2026-02-23T14:27:11Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:11.828786428Z time="2026-02-23T14:27:11Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-tl6dk current-pod.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:11.828786428Z time="2026-02-23T14:27:11Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-tl6dk current-pod.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:11.828901391Z time="2026-02-23T14:27:11Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:11.828901391Z time="2026-02-23T14:27:11Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=D5bE0 2026-02-23T14:27:12.268605971Z time="2026-02-23T14:27:12Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:12.268605971Z time="2026-02-23T14:27:12Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cdrlk current-pod.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:12.268605971Z time="2026-02-23T14:27:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cdrlk current-pod.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:12.268605971Z time="2026-02-23T14:27:12Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:12.268605971Z time="2026-02-23T14:27:12Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=w1ot4 2026-02-23T14:27:12.644358764Z time="2026-02-23T14:27:12Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:12.644358764Z time="2026-02-23T14:27:12Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:12.655961156Z time="2026-02-23T14:27:12Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:12.656101489Z time="2026-02-23T14:27:12Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-pfb9h current-pod.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:12.656101489Z time="2026-02-23T14:27:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-pfb9h current-pod.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:12.656120200Z time="2026-02-23T14:27:12Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=YAzNH 2026-02-23T14:27:12.656133230Z time="2026-02-23T14:27:12Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:12.656133230Z time="2026-02-23T14:27:12Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:12.719237675Z time="2026-02-23T14:27:12Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:12.719237675Z time="2026-02-23T14:27:12Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:13.431914888Z time="2026-02-23T14:27:13Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:13.432053571Z time="2026-02-23T14:27:13Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-fjpvt current-pod.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:13.432053571Z time="2026-02-23T14:27:13Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-fjpvt current-pod.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:13.432077102Z time="2026-02-23T14:27:13Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=OeB6Q 2026-02-23T14:27:13.432077102Z time="2026-02-23T14:27:13Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:13.432087002Z time="2026-02-23T14:27:13Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:13.634652313Z time="2026-02-23T14:27:13Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:13.634816497Z time="2026-02-23T14:27:13Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-pfb9h current-pod.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:13.634816497Z time="2026-02-23T14:27:13Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-pfb9h current-pod.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:13.634981732Z time="2026-02-23T14:27:13Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:13.634981732Z time="2026-02-23T14:27:13Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=YAzNH 2026-02-23T14:27:13.635072534Z time="2026-02-23T14:27:13Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=cnnt5 2026-02-23T14:27:13.635072534Z time="2026-02-23T14:27:13Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=cnnt5 2026-02-23T14:27:14.428374641Z time="2026-02-23T14:27:14Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=cnnt5 2026-02-23T14:27:14.428502035Z time="2026-02-23T14:27:14Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cdrlk current-pod.namespace=openshift-marketplace id=cnnt5 2026-02-23T14:27:14.428502035Z time="2026-02-23T14:27:14Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-cdrlk current-pod.namespace=openshift-marketplace id=cnnt5 2026-02-23T14:27:14.428515215Z time="2026-02-23T14:27:14Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=cnnt5 2026-02-23T14:27:14.428522155Z time="2026-02-23T14:27:14Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=cnnt5 2026-02-23T14:27:14.428528985Z time="2026-02-23T14:27:14Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=cnnt5 2026-02-23T14:27:14.629851773Z time="2026-02-23T14:27:14Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:14.630078269Z time="2026-02-23T14:27:14Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-fjpvt current-pod.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:14.630120070Z time="2026-02-23T14:27:14Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-fjpvt current-pod.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:14.630262904Z time="2026-02-23T14:27:14Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:14.630295415Z time="2026-02-23T14:27:14Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=OeB6Q 2026-02-23T14:27:14.630384557Z time="2026-02-23T14:27:14Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qoD5t 2026-02-23T14:27:14.630430978Z time="2026-02-23T14:27:14Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qoD5t config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_current.log0000640000000000000000000001055315147061704031331 0ustar00000000000000002026-02-23T14:26:50.506854007Z I0223 14:26:50.506516 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-23T14:26:50.507206177Z I0223 14:26:50.507031 1 observer_polling.go:159] Starting file observer 2026-02-23T14:26:50.507350361Z I0223 14:26:50.507286 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T14:26:50.507400622Z I0223 14:26:50.507352 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:26:50.508007988Z I0223 14:26:50.507947 1 observer_polling.go:159] Starting file observer 2026-02-23T14:26:52.858086611Z I0223 14:26:52.857906 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601302238.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-23T14:26:59.238578479Z I0223 14:26:59.235125 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T14:26:59.238578479Z W0223 14:26:59.235177 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:26:59.238578479Z W0223 14:26:59.235184 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:26:59.238578479Z W0223 14:26:59.235192 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T14:26:59.238578479Z W0223 14:26:59.235198 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T14:26:59.238578479Z W0223 14:26:59.235203 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T14:26:59.238578479Z W0223 14:26:59.235210 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T14:26:59.245271449Z I0223 14:26:59.245196 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T14:26:59.245271449Z I0223 14:26:59.245252 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T14:26:59.245315900Z I0223 14:26:59.245298 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T14:26:59.245325280Z I0223 14:26:59.245286 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T14:26:59.245389852Z I0223 14:26:59.245354 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:26:59.245538156Z I0223 14:26:59.245315 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:26:59.246039430Z I0223 14:26:59.245949 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T14:26:59.246429090Z I0223 14:26:59.246293 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-23T14:26:59.246429090Z I0223 14:26:59.246365 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T14:26:59.250241333Z I0223 14:26:59.249666 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-23T14:26:59.250241333Z I0223 14:26:59.250160 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-02-23T14:26:59.346404255Z I0223 14:26:59.346316 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:26:59.346453607Z I0223 14:26:59.346409 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T14:26:59.346462457Z I0223 14:26:59.346317 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-fpwtm/etcd-operator_previous.log0000640000000000000000000000301615147061704031517 0ustar00000000000000002026-02-23T14:24:50.162515714Z I0223 14:24:50.161381 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T14:24:50.162515714Z I0223 14:24:50.161505 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:24:50.162678739Z I0223 14:24:50.162602 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-23T14:24:50.162770251Z I0223 14:24:50.162747 1 observer_polling.go:159] Starting file observer 2026-02-23T14:24:50.162922455Z I0223 14:24:50.162768 1 observer_polling.go:159] Starting file observer 2026-02-23T14:25:50.170523580Z W0223 14:25:50.170338 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods etcd-operator-545bf96f4d-fpwtm) 2026-02-23T14:25:50.174497622Z I0223 14:25:50.170592 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601302238.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-23T14:26:20.510848911Z F0223 14:26:20.510746 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock": context deadline exceeded config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-fpwtm.json0000640000000000000000000002043615147061704024244 0ustar0000000000000000{"metadata":{"name":"etcd-operator-545bf96f4d-fpwtm","generateName":"etcd-operator-545bf96f4d-","namespace":"openshift-etcd-operator","uid":"8de1f285-47ac-42aa-8026-8addce656362","resourceVersion":"9787","creationTimestamp":"2026-02-23T14:17:06Z","labels":{"app":"etcd-operator","pod-template-hash":"545bf96f4d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.16/23\"],\"mac_address\":\"0a:58:0a:80:00:10\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.16/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.16\"\n ],\n \"mac\": \"0a:58:0a:80:00:10\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-545bf96f4d","uid":"b368fff2-650a-46f1-ae44-f219ef52b361","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-x7jvd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-x7jvd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:26:51Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:26:51Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.16","podIPs":[{"ip":"10.128.0.16"}],"startTime":"2026-02-23T14:18:19Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-02-23T14:26:50Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0223 14:24:50.161381 1 cmd.go:253] Using service-serving-cert provided certificates\nI0223 14:24:50.161505 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0223 14:24:50.162602 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/\nI0223 14:24:50.162747 1 observer_polling.go:159] Starting file observer\nI0223 14:24:50.162768 1 observer_polling.go:159] Starting file observer\nW0223 14:25:50.170338 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods etcd-operator-545bf96f4d-fpwtm)\nI0223 14:25:50.170592 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601302238.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9\nF0223 14:26:20.510746 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-23T14:24:50Z","finishedAt":"2026-02-23T14:26:20Z","containerID":"cri-o://a3d7f9dd773bb2be7eef32103651b05954025b8d3ad91ea82c3e56fc88bd34fd"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","containerID":"cri-o://7241c912fdeaeebbd740c87e12cc1e6c5e87f04c4117739e58873e1ff2b89ecc","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-x7jvd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000003312215147061704033530 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-666b887977-f7h552026-02-23T14:19:16.181343620Z W0223 14:19:16.181141 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-23T14:19:16.181656067Z I0223 14:19:16.181631 1 crypto.go:601] Generating new CA for check-endpoints-signer@1771856356 cert, and key in /tmp/serving-cert-977679962/serving-signer.crt, /tmp/serving-cert-977679962/serving-signer.key 2026-02-23T14:19:16.380791058Z I0223 14:19:16.378346 1 observer_polling.go:159] Starting file observer 2026-02-23T14:19:16.419416430Z I0223 14:19:16.418442 1 builder.go:304] check-endpoints version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-23T14:19:16.419416430Z I0223 14:19:16.419155 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-977679962/tls.crt::/tmp/serving-cert-977679962/tls.key" 2026-02-23T14:19:16.809770160Z I0223 14:19:16.809668 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-23T14:19:16.811110779Z I0223 14:19:16.811072 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-23T14:19:16.811110779Z I0223 14:19:16.811095 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-23T14:19:16.811128429Z I0223 14:19:16.811114 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-23T14:19:16.811128429Z I0223 14:19:16.811120 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-23T14:19:16.816926274Z I0223 14:19:16.816890 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T14:19:16.816926274Z W0223 14:19:16.816916 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:19:16.816926274Z W0223 14:19:16.816921 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:19:16.816958975Z W0223 14:19:16.816928 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T14:19:16.816958975Z W0223 14:19:16.816937 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T14:19:16.816958975Z W0223 14:19:16.816940 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T14:19:16.816958975Z W0223 14:19:16.816944 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T14:19:16.817026257Z I0223 14:19:16.817004 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-23T14:19:16.820680315Z I0223 14:19:16.820638 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-977679962/tls.crt::/tmp/serving-cert-977679962/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771856356\" (2026-02-23 14:19:15 +0000 UTC to 2026-03-25 14:19:16 +0000 UTC (now=2026-02-23 14:19:16.820596974 +0000 UTC))" 2026-02-23T14:19:16.820840069Z I0223 14:19:16.820811 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771856356\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771856356\" (2026-02-23 13:19:16 +0000 UTC to 2027-02-23 13:19:16 +0000 UTC (now=2026-02-23 14:19:16.820775697 +0000 UTC))" 2026-02-23T14:19:16.820840069Z I0223 14:19:16.820834 1 secure_serving.go:213] Serving securely on [::]:17698 2026-02-23T14:19:16.820874660Z I0223 14:19:16.820858 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-23T14:19:16.820899460Z I0223 14:19:16.820884 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T14:19:16.820935051Z I0223 14:19:16.820918 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T14:19:16.820977812Z I0223 14:19:16.820958 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-977679962/tls.crt::/tmp/serving-cert-977679962/tls.key" 2026-02-23T14:19:16.821083394Z I0223 14:19:16.821056 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T14:19:16.821204207Z I0223 14:19:16.821151 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T14:19:16.821204207Z I0223 14:19:16.821165 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:19:16.821204207Z I0223 14:19:16.821180 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T14:19:16.821204207Z I0223 14:19:16.821188 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:19:16.821305429Z I0223 14:19:16.821284 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T14:19:16.821305429Z I0223 14:19:16.821299 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T14:19:16.823362793Z I0223 14:19:16.823317 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T14:19:16.823806003Z I0223 14:19:16.823772 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T14:19:16.824023167Z I0223 14:19:16.823948 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T14:19:16.827119174Z I0223 14:19:16.826242 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-02-23T14:19:16.921096829Z I0223 14:19:16.921011 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T14:19:16.921235082Z I0223 14:19:16.921198 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:19:16.921790454Z I0223 14:19:16.921743 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 14:01:56 +0000 UTC to 2036-02-21 14:01:56 +0000 UTC (now=2026-02-23 14:19:16.921705782 +0000 UTC))" 2026-02-23T14:19:16.921842715Z I0223 14:19:16.921814 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-23 14:08:38 +0000 UTC to 2026-02-24 14:08:38 +0000 UTC (now=2026-02-23 14:19:16.921770673 +0000 UTC))" 2026-02-23T14:19:16.921861205Z I0223 14:19:16.921850 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-23 14:08:38 +0000 UTC to 2027-02-23 14:08:38 +0000 UTC (now=2026-02-23 14:19:16.921830525 +0000 UTC))" 2026-02-23T14:19:16.921904036Z I0223 14:19:16.921876 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-23 14:08:38 +0000 UTC to 2027-02-23 14:08:38 +0000 UTC (now=2026-02-23 14:19:16.921858525 +0000 UTC))" 2026-02-23T14:19:16.921918137Z I0223 14:19:16.921908 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 14:08:36 +0000 UTC to 2036-02-21 14:08:36 +0000 UTC (now=2026-02-23 14:19:16.921889956 +0000 UTC))" 2026-02-23T14:19:16.924007792Z I0223 14:19:16.922236 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-977679962/tls.crt::/tmp/serving-cert-977679962/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771856356\" (2026-02-23 14:19:15 +0000 UTC to 2026-03-25 14:19:16 +0000 UTC (now=2026-02-23 14:19:16.922210733 +0000 UTC))" 2026-02-23T14:19:16.924007792Z I0223 14:19:16.922543 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771856356\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771856356\" (2026-02-23 13:19:16 +0000 UTC to 2027-02-23 13:19:16 +0000 UTC (now=2026-02-23 14:19:16.922512669 +0000 UTC))" 2026-02-23T14:19:16.925046434Z I0223 14:19:16.924977 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:19:16.925500704Z I0223 14:19:16.925448 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 14:01:56 +0000 UTC to 2036-02-21 14:01:56 +0000 UTC (now=2026-02-23 14:19:16.925395581 +0000 UTC))" 2026-02-23T14:19:16.925524334Z I0223 14:19:16.925508 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-23 14:08:38 +0000 UTC to 2026-02-24 14:08:38 +0000 UTC (now=2026-02-23 14:19:16.925471743 +0000 UTC))" 2026-02-23T14:19:16.925569245Z I0223 14:19:16.925536 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-23 14:08:38 +0000 UTC to 2027-02-23 14:08:38 +0000 UTC (now=2026-02-23 14:19:16.925515934 +0000 UTC))" 2026-02-23T14:19:16.925582385Z I0223 14:19:16.925563 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-23 14:08:38 +0000 UTC to 2027-02-23 14:08:38 +0000 UTC (now=2026-02-23 14:19:16.925548155 +0000 UTC))" 2026-02-23T14:19:16.925606956Z I0223 14:19:16.925593 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 14:08:36 +0000 UTC to 2036-02-21 14:08:36 +0000 UTC (now=2026-02-23 14:19:16.925579835 +0000 UTC))" 2026-02-23T14:19:16.925619586Z I0223 14:19:16.925613 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-23 14:08:36 +0000 UTC to 2026-02-24 14:08:36 +0000 UTC (now=2026-02-23 14:19:16.925600876 +0000 UTC))" 2026-02-23T14:19:16.925869112Z I0223 14:19:16.925835 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-977679962/tls.crt::/tmp/serving-cert-977679962/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771856356\" (2026-02-23 14:19:15 +0000 UTC to 2026-03-25 14:19:16 +0000 UTC (now=2026-02-23 14:19:16.925815651 +0000 UTC))" 2026-02-23T14:19:16.926072536Z I0223 14:19:16.926044 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771856356\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771856356\" (2026-02-23 13:19:16 +0000 UTC to 2027-02-23 13:19:16 +0000 UTC (now=2026-02-23 14:19:16.926001404 +0000 UTC))" 2026-02-23T14:19:17.165585997Z I0223 14:19:17.165523 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-23T14:19:17.227119122Z I0223 14:19:17.227060 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-02-23T14:19:17.227119122Z I0223 14:19:17.227101 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-666b887977-f7h55/openshift-apiserver_current.log0000640000000000000000000011723015147061704030536 0ustar00000000000000002026-02-23T14:26:41.396797094Z E0223 14:26:41.396730 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.412686721Z E0223 14:26:41.412631 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.422261468Z E0223 14:26:41.422202 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.422373151Z E0223 14:26:41.422325 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.431268590Z E0223 14:26:41.431207 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:43.835216049Z E0223 14:26:43.835115 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:43.835216049Z E0223 14:26:43.835189 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:43.835271571Z E0223 14:26:43.835255 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:43.835343542Z E0223 14:26:43.835303 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:43.835351793Z E0223 14:26:43.835189 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.219621674Z E0223 14:26:44.219506 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.219621674Z E0223 14:26:44.219586 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.219723527Z E0223 14:26:44.219672 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.219723527Z E0223 14:26:44.219694 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.220071796Z E0223 14:26:44.220028 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.276626875Z E0223 14:26:44.275642 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.276626875Z E0223 14:26:44.275672 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.276626875Z E0223 14:26:44.275990 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.276626875Z E0223 14:26:44.276064 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.276626875Z E0223 14:26:44.276310 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.322841457Z E0223 14:26:44.322770 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.322841457Z E0223 14:26:44.322822 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.322895958Z E0223 14:26:44.322837 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.322983411Z E0223 14:26:44.322941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.323028082Z E0223 14:26:44.322839 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.619537296Z E0223 14:26:44.619406 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.619634069Z E0223 14:26:44.619554 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.619754502Z E0223 14:26:44.619713 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.620036819Z E0223 14:26:44.619981 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:44.620259635Z E0223 14:26:44.620197 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.075880433Z E0223 14:26:45.075809 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.075880433Z E0223 14:26:45.075837 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.075937205Z E0223 14:26:45.075912 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.075951155Z E0223 14:26:45.075928 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.076010957Z E0223 14:26:45.075989 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.194728366Z E0223 14:26:45.194668 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.194887280Z E0223 14:26:45.194852 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.195006893Z E0223 14:26:45.194668 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.195308501Z E0223 14:26:45.195277 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.195622430Z E0223 14:26:45.194766 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.300368773Z E0223 14:26:45.300254 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.300642041Z E0223 14:26:45.300593 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.300761774Z E0223 14:26:45.300703 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.300846976Z E0223 14:26:45.300808 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.300945879Z E0223 14:26:45.300907 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.419660367Z E0223 14:26:45.418465 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.419660367Z E0223 14:26:45.418895 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.419660367Z E0223 14:26:45.418988 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.419660367Z E0223 14:26:45.419029 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:45.419660367Z E0223 14:26:45.419127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.241033411Z E0223 14:27:11.240651 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.241545465Z E0223 14:27:11.241434 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.241695289Z E0223 14:27:11.241662 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.241876654Z E0223 14:27:11.241839 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.242152951Z E0223 14:27:11.242104 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.242338 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.242586 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.242812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.243032 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.243232 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.243435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.245096 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.245354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.245587 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.245806 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.246022 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.246238 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246499708Z E0223 14:27:11.246396 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246843017Z E0223 14:27:11.246775 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.246843017Z E0223 14:27:11.246831 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.247447713Z E0223 14:27:11.247402 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.250211308Z E0223 14:27:11.250165 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.263402 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.263555 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.263812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.263906 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.264088 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.264257 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.264302 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.264544 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.264756 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.264793 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265117388Z E0223 14:27:11.265019 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265179210Z E0223 14:27:11.265163 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.265193940Z E0223 14:27:11.265167 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.266200177Z E0223 14:27:11.265371 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.266200177Z E0223 14:27:11.265595 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.266200177Z E0223 14:27:11.265776 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.266200177Z E0223 14:27:11.265836 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.269426704Z E0223 14:27:11.268840 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.276516414Z E0223 14:27:11.275638 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.276516414Z E0223 14:27:11.275649 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.276516414Z E0223 14:27:11.275911 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.276516414Z E0223 14:27:11.276088 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:11.276516414Z E0223 14:27:11.276184 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:13.844464769Z E0223 14:27:13.844340 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:13.844464769Z E0223 14:27:13.844347 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:13.844563681Z E0223 14:27:13.844464 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:13.844586012Z E0223 14:27:13.844561 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:27:13.844602172Z E0223 14:27:13.844570 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315147061704040546 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-8586dccc9b-tvnmq2026-02-23T14:26:47.440058865Z I0223 14:26:47.439802 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T14:26:47.440058865Z I0223 14:26:47.439961 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:26:47.440682391Z I0223 14:26:47.440622 1 observer_polling.go:159] Starting file observer 2026-02-23T14:26:52.859453328Z I0223 14:26:52.859356 1 builder.go:304] openshift-apiserver-operator version - 2026-02-23T14:26:59.221133121Z I0223 14:26:59.221045 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T14:26:59.221133121Z W0223 14:26:59.221079 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:26:59.221133121Z W0223 14:26:59.221086 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:26:59.221133121Z W0223 14:26:59.221092 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T14:26:59.221133121Z W0223 14:26:59.221097 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T14:26:59.221133121Z W0223 14:26:59.221101 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T14:26:59.221133121Z W0223 14:26:59.221105 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T14:26:59.225262002Z I0223 14:26:59.225193 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-23T14:26:59.226025412Z I0223 14:26:59.225948 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... 2026-02-23T14:26:59.229147556Z I0223 14:26:59.229087 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-23T14:26:59.229171247Z I0223 14:26:59.229150 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T14:26:59.229180987Z I0223 14:26:59.229175 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T14:26:59.229303380Z I0223 14:26:59.229225 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T14:26:59.229379952Z I0223 14:26:59.229348 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T14:26:59.229498535Z I0223 14:26:59.229459 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T14:26:59.229498535Z I0223 14:26:59.229470 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:26:59.229518496Z I0223 14:26:59.229508 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T14:26:59.229528026Z I0223 14:26:59.229516 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:26:59.329710537Z I0223 14:26:59.329325 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T14:26:59.329833190Z I0223 14:26:59.329772 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:26:59.331931427Z I0223 14:26:59.331877 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file openshift-apiserver-operator_previous.log0000640000000000000000000000221715147061704040747 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-8586dccc9b-tvnmq2026-02-23T14:24:49.993403156Z I0223 14:24:49.992039 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T14:24:49.993403156Z I0223 14:24:49.992192 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:24:49.993403156Z I0223 14:24:49.992701 1 observer_polling.go:159] Starting file observer 2026-02-23T14:25:50.003988567Z W0223 14:25:50.003915 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods) 2026-02-23T14:25:50.004127291Z I0223 14:25:50.004091 1 builder.go:304] openshift-apiserver-operator version - 2026-02-23T14:26:20.308306001Z F0223 14:26:20.308178 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock": context deadline exceeded config/pod/openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-tvnmq.json0000640000000000000000000001640215147061704030471 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-8586dccc9b-tvnmq","generateName":"openshift-apiserver-operator-8586dccc9b-","namespace":"openshift-apiserver-operator","uid":"24829faf-50e8-45bb-abb0-7cc5ccf81080","resourceVersion":"9784","creationTimestamp":"2026-02-23T14:17:05Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"8586dccc9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-8586dccc9b","uid":"62bae94c-cda3-4c0d-8f42-ccd8cad7f87f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-7hp42","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7hp42","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c10"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:26:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:26:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-02-23T14:18:19Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-02-23T14:26:47Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0223 14:24:49.992039 1 cmd.go:253] Using service-serving-cert provided certificates\nI0223 14:24:49.992192 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0223 14:24:49.992701 1 observer_polling.go:159] Starting file observer\nW0223 14:25:50.003915 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0223 14:25:50.004091 1 builder.go:304] openshift-apiserver-operator version -\nF0223 14:26:20.308178 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-23T14:24:49Z","finishedAt":"2026-02-23T14:26:20Z","containerID":"cri-o://50817d53493752eda9d4463a0b5a65e93107befbd5b1e52f265dd7c7f17a73bc"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","containerID":"cri-o://0772c3729738659c84accce490c8a697b2dc528f52ebd605f9f2d93ea9004a9e","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7hp42","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515147061704043033 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-77cd4d9559-qvq8x2026-02-23T14:26:44.141875746Z I0223 14:26:44.141663 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T14:26:44.141875746Z I0223 14:26:44.141804 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:26:44.169117858Z I0223 14:26:44.168693 1 observer_polling.go:159] Starting file observer 2026-02-23T14:26:52.856588771Z I0223 14:26:52.856334 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601302238.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31 2026-02-23T14:26:59.228366895Z I0223 14:26:59.228285 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T14:26:59.228366895Z W0223 14:26:59.228321 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:26:59.228366895Z W0223 14:26:59.228327 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:26:59.228366895Z W0223 14:26:59.228333 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T14:26:59.228366895Z W0223 14:26:59.228337 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T14:26:59.228366895Z W0223 14:26:59.228341 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T14:26:59.228366895Z W0223 14:26:59.228345 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236187 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236241 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236280 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236298 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236260 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236316 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236663 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236718 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236835 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T14:26:59.238636331Z I0223 14:26:59.236830 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-23T14:26:59.238636331Z I0223 14:26:59.237165 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-02-23T14:26:59.336788737Z I0223 14:26:59.336705 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:26:59.336832678Z I0223 14:26:59.336768 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T14:26:59.336832678Z I0223 14:26:59.336804 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000000250415147061704043227 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-77cd4d9559-qvq8x2026-02-23T14:24:50.166896897Z I0223 14:24:50.166774 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T14:24:50.166896897Z I0223 14:24:50.166866 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:24:50.167973985Z I0223 14:24:50.167940 1 observer_polling.go:159] Starting file observer 2026-02-23T14:25:50.173512177Z W0223 14:25:50.173382 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-operator-77cd4d9559-qvq8x) 2026-02-23T14:25:50.173545978Z I0223 14:25:50.173507 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601302238.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31 2026-02-23T14:26:20.439929776Z F0223 14:26:20.439785 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock": context deadline exceeded config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-qvq8x.json0000640000000000000000000001610715147061704032067 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-77cd4d9559-qvq8x","generateName":"openshift-kube-scheduler-operator-77cd4d9559-","namespace":"openshift-kube-scheduler-operator","uid":"b9cf1c39-24f0-420b-8020-089616d1cdf0","resourceVersion":"9769","creationTimestamp":"2026-02-23T14:17:05Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"77cd4d9559"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-77cd4d9559","uid":"6a2411e9-0b83-493c-a94e-9af206988312","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:26:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:26:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-02-23T14:18:19Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-02-23T14:26:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0223 14:24:50.166774 1 cmd.go:253] Using service-serving-cert provided certificates\nI0223 14:24:50.166866 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0223 14:24:50.167940 1 observer_polling.go:159] Starting file observer\nW0223 14:25:50.173382 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-operator-77cd4d9559-qvq8x)\nI0223 14:25:50.173507 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601302238.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31\nF0223 14:26:20.439785 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-23T14:24:50Z","finishedAt":"2026-02-23T14:26:20Z","containerID":"cri-o://cb07ee7a08ec58d0214f496b0ca32c3611b77165c521b9fecab35b067ef91753"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","containerID":"cri-o://de147076f9d00421d454d2b4d2c157f8440c0694fa5a6d3ad620d5c550d4adbe","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-4-master-0/installer_current.log0000640000000000000000000001275415147061704027176 0ustar00000000000000002026-02-23T14:19:44.311591405Z I0223 14:19:44.311302 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000a45ea0 cert-secrets:0xc000a45c20 configmaps:0xc000a457c0 namespace:0xc000a455e0 optional-configmaps:0xc000a45900 optional-secrets:0xc000a45860 pod:0xc000a45680 pod-manifest-dir:0xc000a45a40 resource-dir:0xc000a459a0 revision:0xc000a45540 secrets:0xc000a45720 v:0xc000a7a960] [0xc000a7a960 0xc000a45540 0xc000a455e0 0xc000a45680 0xc000a459a0 0xc000a45a40 0xc000a457c0 0xc000a45900 0xc000a45860 0xc000a45720 0xc000a45ea0 0xc000a45c20] [] map[cert-configmaps:0xc000a45cc0 cert-dir:0xc000a45ea0 cert-secrets:0xc000a45c20 configmaps:0xc000a457c0 help:0xc000a7ad20 kubeconfig:0xc000a454a0 log-flush-frequency:0xc000a7a8c0 namespace:0xc000a455e0 optional-cert-configmaps:0xc000a45e00 optional-cert-secrets:0xc000a45d60 optional-configmaps:0xc000a45900 optional-secrets:0xc000a45860 pod:0xc000a45680 pod-manifest-dir:0xc000a45a40 pod-manifests-lock-file:0xc000a45b80 resource-dir:0xc000a459a0 revision:0xc000a45540 secrets:0xc000a45720 timeout-duration:0xc000a45ae0 v:0xc000a7a960 vmodule:0xc000a7aa00] [0xc000a454a0 0xc000a45540 0xc000a455e0 0xc000a45680 0xc000a45720 0xc000a457c0 0xc000a45860 0xc000a45900 0xc000a459a0 0xc000a45a40 0xc000a45ae0 0xc000a45b80 0xc000a45c20 0xc000a45cc0 0xc000a45d60 0xc000a45e00 0xc000a45ea0 0xc000a7a8c0 0xc000a7a960 0xc000a7aa00 0xc000a7ad20] [0xc000a45cc0 0xc000a45ea0 0xc000a45c20 0xc000a457c0 0xc000a7ad20 0xc000a454a0 0xc000a7a8c0 0xc000a455e0 0xc000a45e00 0xc000a45d60 0xc000a45900 0xc000a45860 0xc000a45680 0xc000a45a40 0xc000a45b80 0xc000a459a0 0xc000a45540 0xc000a45720 0xc000a45ae0 0xc000a7a960 0xc000a7aa00] map[104:0xc000a7ad20 118:0xc000a7a960] [] -1 0 0xc000a60840 true 0x223d5a0 []} 2026-02-23T14:19:44.312524295Z I0223 14:19:44.312462 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0009f04e0)({ 2026-02-23T14:19:44.312524295Z KubeConfig: (string) "", 2026-02-23T14:19:44.312524295Z KubeClient: (kubernetes.Interface) , 2026-02-23T14:19:44.312524295Z Revision: (string) (len=1) "4", 2026-02-23T14:19:44.312524295Z NodeName: (string) "", 2026-02-23T14:19:44.312524295Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-02-23T14:19:44.312524295Z Clock: (clock.RealClock) { 2026-02-23T14:19:44.312524295Z }, 2026-02-23T14:19:44.312524295Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-02-23T14:19:44.312524295Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T14:19:44.312524295Z (string) (len=31) "localhost-recovery-client-token" 2026-02-23T14:19:44.312524295Z }, 2026-02-23T14:19:44.312524295Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T14:19:44.312524295Z (string) (len=12) "serving-cert" 2026-02-23T14:19:44.312524295Z }, 2026-02-23T14:19:44.312524295Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-23T14:19:44.312524295Z (string) (len=18) "kube-scheduler-pod", 2026-02-23T14:19:44.312524295Z (string) (len=6) "config", 2026-02-23T14:19:44.312524295Z (string) (len=17) "serviceaccount-ca", 2026-02-23T14:19:44.312524295Z (string) (len=20) "scheduler-kubeconfig", 2026-02-23T14:19:44.312524295Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-23T14:19:44.312524295Z }, 2026-02-23T14:19:44.312524295Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T14:19:44.312524295Z (string) (len=16) "policy-configmap" 2026-02-23T14:19:44.312524295Z }, 2026-02-23T14:19:44.312524295Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-23T14:19:44.312524295Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-23T14:19:44.312524295Z }, 2026-02-23T14:19:44.312524295Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-23T14:19:44.312524295Z CertConfigMapNamePrefixes: ([]string) , 2026-02-23T14:19:44.312524295Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-23T14:19:44.312524295Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-23T14:19:44.312524295Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-23T14:19:44.312524295Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-23T14:19:44.312524295Z Timeout: (time.Duration) 2m0s, 2026-02-23T14:19:44.312524295Z StaticPodManifestsLockFile: (string) "", 2026-02-23T14:19:44.312524295Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-23T14:19:44.312524295Z KubeletVersion: (string) "" 2026-02-23T14:19:44.312524295Z }) 2026-02-23T14:19:44.386834526Z I0223 14:19:44.386367 1 cmd.go:413] Getting controller reference for node master-0 2026-02-23T14:19:44.469531518Z I0223 14:19:44.466867 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-23T14:19:44.469531518Z I0223 14:19:44.466919 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T14:19:44.469531518Z I0223 14:19:44.466933 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T14:19:44.498878010Z I0223 14:19:44.494870 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-23T14:20:14.495255858Z I0223 14:20:14.495167 1 cmd.go:524] Getting installer pods for node master-0 2026-02-23T14:20:28.496863206Z F0223 14:20:28.496736 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715147061704027210 0ustar00000000000000002026-02-23T14:19:18.284427053Z I0223 14:19:18.190314 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000a56820 cert-dir:0xc000a56a00 cert-secrets:0xc000a56780 configmaps:0xc000a56320 namespace:0xc000a56140 optional-cert-configmaps:0xc000a56960 optional-cert-secrets:0xc000a568c0 optional-configmaps:0xc000a56460 optional-secrets:0xc000a563c0 pod:0xc000a561e0 pod-manifest-dir:0xc000a565a0 resource-dir:0xc000a56500 revision:0xc000a560a0 secrets:0xc000a56280 v:0xc000a57e00] [0xc000a57e00 0xc000a560a0 0xc000a56140 0xc000a561e0 0xc000a56500 0xc000a565a0 0xc000a56320 0xc000a56460 0xc000a56280 0xc000a563c0 0xc000a56a00 0xc000a56820 0xc000a56960 0xc000a56780 0xc000a568c0] [] map[cert-configmaps:0xc000a56820 cert-dir:0xc000a56a00 cert-secrets:0xc000a56780 configmaps:0xc000a56320 help:0xc000a68280 kubeconfig:0xc000a56000 log-flush-frequency:0xc000a57d60 namespace:0xc000a56140 optional-cert-configmaps:0xc000a56960 optional-cert-secrets:0xc000a568c0 optional-configmaps:0xc000a56460 optional-secrets:0xc000a563c0 pod:0xc000a561e0 pod-manifest-dir:0xc000a565a0 pod-manifests-lock-file:0xc000a566e0 resource-dir:0xc000a56500 revision:0xc000a560a0 secrets:0xc000a56280 timeout-duration:0xc000a56640 v:0xc000a57e00 vmodule:0xc000a57ea0] [0xc000a56000 0xc000a560a0 0xc000a56140 0xc000a561e0 0xc000a56280 0xc000a56320 0xc000a563c0 0xc000a56460 0xc000a56500 0xc000a565a0 0xc000a56640 0xc000a566e0 0xc000a56780 0xc000a56820 0xc000a568c0 0xc000a56960 0xc000a56a00 0xc000a57d60 0xc000a57e00 0xc000a57ea0 0xc000a68280] [0xc000a56820 0xc000a56a00 0xc000a56780 0xc000a56320 0xc000a68280 0xc000a56000 0xc000a57d60 0xc000a56140 0xc000a56960 0xc000a568c0 0xc000a56460 0xc000a563c0 0xc000a561e0 0xc000a565a0 0xc000a566e0 0xc000a56500 0xc000a560a0 0xc000a56280 0xc000a56640 0xc000a57e00 0xc000a57ea0] map[104:0xc000a68280 118:0xc000a57e00] [] -1 0 0xc000a252f0 true 0xae1c20 []} 2026-02-23T14:19:18.287561370Z I0223 14:19:18.286955 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000607380)({ 2026-02-23T14:19:18.287561370Z KubeConfig: (string) "", 2026-02-23T14:19:18.287561370Z KubeClient: (kubernetes.Interface) , 2026-02-23T14:19:18.287561370Z Revision: (string) (len=1) "1", 2026-02-23T14:19:18.287561370Z NodeName: (string) "", 2026-02-23T14:19:18.287561370Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-02-23T14:19:18.287561370Z Clock: (clock.RealClock) { 2026-02-23T14:19:18.287561370Z }, 2026-02-23T14:19:18.287561370Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-02-23T14:19:18.287561370Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-23T14:19:18.287561370Z (string) (len=11) "etcd-client", 2026-02-23T14:19:18.287561370Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-02-23T14:19:18.287561370Z (string) (len=31) "localhost-recovery-client-token" 2026-02-23T14:19:18.287561370Z }, 2026-02-23T14:19:18.287561370Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-23T14:19:18.287561370Z (string) (len=17) "encryption-config", 2026-02-23T14:19:18.287561370Z (string) (len=21) "webhook-authenticator" 2026-02-23T14:19:18.287561370Z }, 2026-02-23T14:19:18.287561370Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-23T14:19:18.287561370Z (string) (len=18) "kube-apiserver-pod", 2026-02-23T14:19:18.287561370Z (string) (len=6) "config", 2026-02-23T14:19:18.287561370Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-02-23T14:19:18.287561370Z (string) (len=28) "bound-sa-token-signing-certs", 2026-02-23T14:19:18.287561370Z (string) (len=15) "etcd-serving-ca", 2026-02-23T14:19:18.287561370Z (string) (len=18) "kubelet-serving-ca", 2026-02-23T14:19:18.287561370Z (string) (len=22) "sa-token-signing-certs", 2026-02-23T14:19:18.287561370Z (string) (len=29) "kube-apiserver-audit-policies" 2026-02-23T14:19:18.287561370Z }, 2026-02-23T14:19:18.287561370Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-23T14:19:18.287561370Z (string) (len=14) "oauth-metadata", 2026-02-23T14:19:18.287561370Z (string) (len=12) "cloud-config", 2026-02-23T14:19:18.287561370Z (string) (len=24) "kube-apiserver-server-ca" 2026-02-23T14:19:18.287561370Z }, 2026-02-23T14:19:18.287561370Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-02-23T14:19:18.287561370Z (string) (len=17) "aggregator-client", 2026-02-23T14:19:18.287561370Z (string) (len=30) "localhost-serving-cert-certkey", 2026-02-23T14:19:18.287561370Z (string) (len=31) "service-network-serving-certkey", 2026-02-23T14:19:18.287561370Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-02-23T14:19:18.287561370Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-02-23T14:19:18.287561370Z (string) (len=33) "bound-service-account-signing-key", 2026-02-23T14:19:18.287561370Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-02-23T14:19:18.287561370Z (string) (len=31) "check-endpoints-client-cert-key", 2026-02-23T14:19:18.287561370Z (string) (len=14) "kubelet-client", 2026-02-23T14:19:18.287561370Z (string) (len=16) "node-kubeconfigs" 2026-02-23T14:19:18.287561370Z }, 2026-02-23T14:19:18.287561370Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-02-23T14:19:18.287561370Z (string) (len=17) "user-serving-cert", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-000", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-001", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-002", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-003", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-004", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-005", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-006", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-007", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-008", 2026-02-23T14:19:18.287561370Z (string) (len=21) "user-serving-cert-009" 2026-02-23T14:19:18.287561370Z }, 2026-02-23T14:19:18.287561370Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-23T14:19:18.287561370Z (string) (len=20) "aggregator-client-ca", 2026-02-23T14:19:18.287561370Z (string) (len=9) "client-ca", 2026-02-23T14:19:18.287561370Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-23T14:19:18.287561370Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-23T14:19:18.287561370Z }, 2026-02-23T14:19:18.287561370Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-23T14:19:18.287561370Z (string) (len=17) "trusted-ca-bundle" 2026-02-23T14:19:18.287561370Z }, 2026-02-23T14:19:18.287561370Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-23T14:19:18.287561370Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-23T14:19:18.287561370Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-23T14:19:18.287561370Z Timeout: (time.Duration) 2m0s, 2026-02-23T14:19:18.287561370Z StaticPodManifestsLockFile: (string) "", 2026-02-23T14:19:18.287561370Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-23T14:19:18.287561370Z KubeletVersion: (string) "" 2026-02-23T14:19:18.287561370Z }) 2026-02-23T14:19:18.288561332Z I0223 14:19:18.288530 1 cmd.go:413] Getting controller reference for node master-0 2026-02-23T14:19:18.302553393Z I0223 14:19:18.301941 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-23T14:19:18.302553393Z I0223 14:19:18.302125 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T14:19:18.302553393Z I0223 14:19:18.302137 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T14:19:18.304949235Z I0223 14:19:18.304893 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-23T14:19:48.305569867Z I0223 14:19:48.305519 1 cmd.go:524] Getting installer pods for node master-0 2026-02-23T14:20:02.309934492Z F0223 14:20:02.309839 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615147061704035770 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-23T14:16:42.648358073Z I0223 14:16:42.648168 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000007113215147061704032664 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-23T14:27:03.353676180Z Trace[1160741022]: [17.851212748s] [17.851212748s] END 2026-02-23T14:27:05.931842829Z I0223 14:27:05.931730 1 trace.go:236] Trace[1936113792]: "Get" accept:application/json, */*,audit-id:ca064bda-f518-40a7-8efc-f576cf1289db,client:10.128.0.50,api-group:config.openshift.io,api-version:v1,name:cluster,subresource:,namespace:,protocol:HTTP/2.0,resource:networks,scope:resource,url:/apis/config.openshift.io/v1/networks/cluster,user-agent:cluster-baremetal-operator/v0.0.0 (linux/amd64) kubernetes/$Format/cluster-baremetal-operator,verb:GET (23-Feb-2026 14:26:57.535) (total time: 8396ms): 2026-02-23T14:27:05.931842829Z Trace[1936113792]: ---"About to write a response" 8396ms (14:27:05.931) 2026-02-23T14:27:05.931842829Z Trace[1936113792]: [8.396374856s] [8.396374856s] END 2026-02-23T14:27:08.284996913Z I0223 14:27:08.284877 1 trace.go:236] Trace[378922548]: "List" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:4ad0e496-6bd6-4d0b-b2bd-12e658eab72d,client:10.128.0.55,api-group:,api-version:v1,name:,subresource:,namespace:openshift-kube-scheduler-operator,protocol:HTTP/2.0,resource:events,scope:namespace,url:/api/v1/namespaces/openshift-kube-scheduler-operator/events,user-agent:insights-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:LIST (23-Feb-2026 14:26:58.635) (total time: 9649ms): 2026-02-23T14:27:08.284996913Z Trace[378922548]: ["List(recursive=true) etcd3" audit-id:4ad0e496-6bd6-4d0b-b2bd-12e658eab72d,key:/events/openshift-kube-scheduler-operator,resourceVersion:,resourceVersionMatch:,limit:0,continue: 9649ms (14:26:58.635)] 2026-02-23T14:27:08.284996913Z Trace[378922548]: [9.649705248s] [9.649705248s] END 2026-02-23T14:27:08.289152815Z I0223 14:27:08.288961 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.289243627Z I0223 14:27:08.289135 1 trace.go:236] Trace[1054584343]: "Create" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:db9cdc0b-cf28-4ccc-88de-e29297dad9b7,client:192.168.32.10,api-group:,api-version:v1,name:,subresource:,namespace:openshift-config-operator,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-config-operator/events,user-agent:kubelet/v1.31.14 (linux/amd64) kubernetes/8311c4d,verb:POST (23-Feb-2026 14:26:35.048) (total time: 33240ms): 2026-02-23T14:27:08.289243627Z Trace[1054584343]: ["Create etcd3" audit-id:db9cdc0b-cf28-4ccc-88de-e29297dad9b7,key:/events/openshift-config-operator/openshift-config-operator-6f47d587d6-55qjr.1896e60017865813,type:*core.Event,resource:events 33238ms (14:26:35.050) 2026-02-23T14:27:08.289243627Z Trace[1054584343]: ---"TransformToStorage succeeded" 33234ms (14:27:08.284)] 2026-02-23T14:27:08.289243627Z Trace[1054584343]: [33.240179573s] [33.240179573s] END 2026-02-23T14:27:08.292929466Z I0223 14:27:08.292800 1 trace.go:236] Trace[1831159196]: "Create" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:2f58463b-7873-4ba3-93bd-86bd7955a123,client:192.168.32.10,api-group:,api-version:v1,name:,subresource:,namespace:openshift-ovn-kubernetes,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-ovn-kubernetes/events,user-agent:master-0/ovnkube@392b470acd6e (linux/amd64) kubernetes/v0.33.3,verb:POST (23-Feb-2026 14:26:45.280) (total time: 23011ms): 2026-02-23T14:27:08.292929466Z Trace[1831159196]: ["Create etcd3" audit-id:2f58463b-7873-4ba3-93bd-86bd7955a123,key:/events/openshift-ovn-kubernetes/ovn-kubernetes-master.1896e6606f8c9f19,type:*core.Event,resource:events 23010ms (14:26:45.282) 2026-02-23T14:27:08.292929466Z Trace[1831159196]: ---"TransformToStorage succeeded" 23002ms (14:27:08.284)] 2026-02-23T14:27:08.292929466Z Trace[1831159196]: [23.01183418s] [23.01183418s] END 2026-02-23T14:27:08.293820040Z I0223 14:27:08.293210 1 trace.go:236] Trace[1004063565]: "Create" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:1683a901-592f-42c3-949a-f7d256901d01,client:10.128.0.58,api-group:,api-version:v1,name:,subresource:,namespace:openshift-controller-manager,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-controller-manager/events,user-agent:openshift-controller-manager/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (23-Feb-2026 14:26:45.277) (total time: 23016ms): 2026-02-23T14:27:08.293820040Z Trace[1004063565]: ["Create etcd3" audit-id:1683a901-592f-42c3-949a-f7d256901d01,key:/events/openshift-controller-manager/openshift-master-controllers.1896e6606f507f02,type:*core.Event,resource:events 23014ms (14:26:45.278) 2026-02-23T14:27:08.293820040Z Trace[1004063565]: ---"TransformToStorage succeeded" 23006ms (14:27:08.284)] 2026-02-23T14:27:08.293820040Z Trace[1004063565]: [23.016035453s] [23.016035453s] END 2026-02-23T14:27:08.297445218Z I0223 14:27:08.297358 1 trace.go:236] Trace[17475182]: "Create" accept:application/json, */*,audit-id:e3abd733-fc6a-478b-809e-b158988a20c0,client:10.128.0.57,api-group:,api-version:v1,name:,subresource:,namespace:openshift-machine-api,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-machine-api/events,user-agent:machine-api-operator/v0.0.0 (linux/amd64) kubernetes/$Format/machine-api-operator,verb:POST (23-Feb-2026 14:26:52.963) (total time: 15334ms): 2026-02-23T14:27:08.297445218Z Trace[17475182]: ["Create etcd3" audit-id:e3abd733-fc6a-478b-809e-b158988a20c0,key:/events/openshift-machine-api/machine-api-operator.1896e662396ad3a8,type:*core.Event,resource:events 15333ms (14:26:52.964) 2026-02-23T14:27:08.297445218Z Trace[17475182]: ---"TransformToStorage succeeded" 15320ms (14:27:08.284)] 2026-02-23T14:27:08.297445218Z Trace[17475182]: [15.334293826s] [15.334293826s] END 2026-02-23T14:27:08.297445218Z I0223 14:27:08.297405 1 trace.go:236] Trace[1595493183]: "Create" accept:application/json, */*,audit-id:207452b6-e86e-4cf0-8613-8e8c3d67961d,client:10.128.0.52,api-group:,api-version:v1,name:,subresource:,namespace:openshift-config-operator,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-config-operator/events,user-agent:cluster-config-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (23-Feb-2026 14:27:03.056) (total time: 5240ms): 2026-02-23T14:27:08.297445218Z Trace[1595493183]: ["Create etcd3" audit-id:207452b6-e86e-4cf0-8613-8e8c3d67961d,key:/events/openshift-config-operator/openshift-config-operator.1896e66493015a7f,type:*core.Event,resource:events 5238ms (14:27:03.058) 2026-02-23T14:27:08.297445218Z Trace[1595493183]: ---"TransformToStorage succeeded" 5226ms (14:27:08.285)] 2026-02-23T14:27:08.297445218Z Trace[1595493183]: [5.240512588s] [5.240512588s] END 2026-02-23T14:27:08.297896110Z I0223 14:27:08.297845 1 trace.go:236] Trace[1869672633]: "Create" accept:application/json, */*,audit-id:32a8db8e-163b-45c1-8de2-b9944da7d583,client:10.128.0.52,api-group:,api-version:v1,name:,subresource:,namespace:openshift-config-operator,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-config-operator/events,user-agent:cluster-config-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (23-Feb-2026 14:27:02.953) (total time: 5343ms): 2026-02-23T14:27:08.297896110Z Trace[1869672633]: ["Create etcd3" audit-id:32a8db8e-163b-45c1-8de2-b9944da7d583,key:/events/openshift-config-operator/openshift-config-operator.1896e6648ce627c8,type:*core.Event,resource:events 5342ms (14:27:02.955) 2026-02-23T14:27:08.297896110Z Trace[1869672633]: ---"TransformToStorage succeeded" 5329ms (14:27:08.284)] 2026-02-23T14:27:08.297896110Z Trace[1869672633]: [5.343975287s] [5.343975287s] END 2026-02-23T14:27:08.297896110Z I0223 14:27:08.297867 1 trace.go:236] Trace[1364345849]: "Create" accept:application/json, */*,audit-id:8e4d245b-8ac2-47ca-9b3b-d25b832b29da,client:10.128.0.57,api-group:,api-version:v1,name:,subresource:,namespace:default,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/default/events,user-agent:machine-api-operator/v0.0.0 (linux/amd64) kubernetes/$Format/machine-api-operator,verb:POST (23-Feb-2026 14:26:57.536) (total time: 10761ms): 2026-02-23T14:27:08.297896110Z Trace[1364345849]: ["Create etcd3" audit-id:8e4d245b-8ac2-47ca-9b3b-d25b832b29da,key:/events/default/machine-api.1896e6634a0bfba5,type:*core.Event,resource:events 10760ms (14:26:57.537) 2026-02-23T14:27:08.297896110Z Trace[1364345849]: ---"TransformToStorage succeeded" 10747ms (14:27:08.284)] 2026-02-23T14:27:08.297896110Z Trace[1364345849]: [10.761086871s] [10.761086871s] END 2026-02-23T14:27:08.298193478Z I0223 14:27:08.298152 1 trace.go:236] Trace[847126689]: "Create" accept:application/json, */*,audit-id:fda6092a-3846-4bf2-be31-e91833e2614a,client:169.254.0.1,api-group:,api-version:v1,name:,subresource:,namespace:openshift-cluster-machine-approver,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-cluster-machine-approver/events,user-agent:machine-approver/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (23-Feb-2026 14:26:52.498) (total time: 15799ms): 2026-02-23T14:27:08.298193478Z Trace[847126689]: ["Create etcd3" audit-id:fda6092a-3846-4bf2-be31-e91833e2614a,key:/events/openshift-cluster-machine-approver/cluster-machine-approver-leader.1896e6621dbde8d3,type:*core.Event,resource:events 15797ms (14:26:52.500) 2026-02-23T14:27:08.298193478Z Trace[847126689]: ---"TransformToStorage succeeded" 15784ms (14:27:08.284)] 2026-02-23T14:27:08.298193478Z Trace[847126689]: [15.799394738s] [15.799394738s] END 2026-02-23T14:27:08.298260639Z I0223 14:27:08.298208 1 trace.go:236] Trace[1273400140]: "Create" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:40d887aa-5975-4c50-bcf9-024f5e19045c,client:192.168.32.10,api-group:,api-version:v1,name:,subresource:,namespace:openshift-marketplace,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-marketplace/events,user-agent:multus-daemon/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (23-Feb-2026 14:27:02.998) (total time: 5299ms): 2026-02-23T14:27:08.298260639Z Trace[1273400140]: ["Create etcd3" audit-id:40d887aa-5975-4c50-bcf9-024f5e19045c,key:/events/openshift-marketplace/redhat-marketplace-pfb9h.1896e6648f95f053,type:*core.Event,resource:events 5298ms (14:27:02.999) 2026-02-23T14:27:08.298260639Z Trace[1273400140]: ---"TransformToStorage succeeded" 5285ms (14:27:08.285)] 2026-02-23T14:27:08.298260639Z Trace[1273400140]: [5.299870813s] [5.299870813s] END 2026-02-23T14:27:08.298285830Z I0223 14:27:08.298271 1 trace.go:236] Trace[1260974544]: "Create" accept:application/vnd.kubernetes.protobuf, */*,audit-id:fd9f4ade-d96d-442c-bb65-b630b3e2b687,client:::1,api-group:,api-version:v1,name:,subresource:,namespace:kube-system,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/kube-system/events,user-agent:kube-scheduler/v1.31.14 (linux/amd64) kubernetes/8311c4d/scheduler,verb:POST (23-Feb-2026 14:27:02.209) (total time: 6088ms): 2026-02-23T14:27:08.298285830Z Trace[1260974544]: ["Create etcd3" audit-id:fd9f4ade-d96d-442c-bb65-b630b3e2b687,key:/events/kube-system/kube-scheduler.1896e664608d44ef,type:*core.Event,resource:events 6087ms (14:27:02.211) 2026-02-23T14:27:08.298285830Z Trace[1260974544]: ---"TransformToStorage succeeded" 6073ms (14:27:08.284)] 2026-02-23T14:27:08.298285830Z Trace[1260974544]: [6.08831254s] [6.08831254s] END 2026-02-23T14:27:08.298694821Z I0223 14:27:08.298643 1 trace.go:236] Trace[1990728010]: "Create" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:465e5c75-8ad3-41c4-9915-ce9621dd2f39,client:10.128.0.52,api-group:,api-version:v1,name:,subresource:,namespace:openshift-config-operator,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-config-operator/events,user-agent:cluster-config-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (23-Feb-2026 14:27:02.939) (total time: 5359ms): 2026-02-23T14:27:08.298694821Z Trace[1990728010]: ["Create etcd3" audit-id:465e5c75-8ad3-41c4-9915-ce9621dd2f39,key:/events/openshift-config-operator/config-operator-lock.1896e6648c04e2d9,type:*core.Event,resource:events 5358ms (14:27:02.940) 2026-02-23T14:27:08.298694821Z Trace[1990728010]: ---"TransformToStorage succeeded" 5344ms (14:27:08.284)] 2026-02-23T14:27:08.298694821Z Trace[1990728010]: [5.359510645s] [5.359510645s] END 2026-02-23T14:27:08.299339578Z I0223 14:27:08.299235 1 trace.go:236] Trace[2037643237]: "Create" accept:application/json, */*,audit-id:d5bdf17e-318d-44d5-8656-c8acb8c0aec4,client:10.128.0.20,api-group:,api-version:v1,name:,subresource:,namespace:openshift-cluster-node-tuning-operator,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/openshift-cluster-node-tuning-operator/events,user-agent:cluster-node-tuning-operator/v0.0.0 (linux/amd64) kubernetes/$Format/cluster-node-tuning-operator,verb:POST (23-Feb-2026 14:26:52.870) (total time: 15428ms): 2026-02-23T14:27:08.299339578Z Trace[2037643237]: ["Create etcd3" audit-id:d5bdf17e-318d-44d5-8656-c8acb8c0aec4,key:/events/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator.1896e66233ccae43,type:*core.Event,resource:events 15427ms (14:26:52.871) 2026-02-23T14:27:08.299339578Z Trace[2037643237]: ---"TransformToStorage succeeded" 15412ms (14:27:08.284)] 2026-02-23T14:27:08.299339578Z Trace[2037643237]: [15.428174747s] [15.428174747s] END 2026-02-23T14:27:08.304786215Z I0223 14:27:08.304255 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.333806874Z I0223 14:27:08.333743 1 trace.go:236] Trace[2147340695]: "List" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:a04aed41-a544-4343-9965-fb584360a376,client:10.128.0.58,api-group:,api-version:v1,name:,subresource:,namespace:,protocol:HTTP/2.0,resource:events,scope:cluster,url:/api/v1/events,user-agent:openshift-controller-manager/v0.0.0 (linux/amd64) kubernetes/$Format/system:serviceaccount:openshift-infra:unidling-controller,verb:LIST (23-Feb-2026 14:26:45.369) (total time: 22964ms): 2026-02-23T14:27:08.333806874Z Trace[2147340695]: ["List(recursive=true) etcd3" audit-id:a04aed41-a544-4343-9965-fb584360a376,key:/events,resourceVersion:,resourceVersionMatch:,limit:500,continue: 22964ms (14:26:45.369)] 2026-02-23T14:27:08.333806874Z Trace[2147340695]: [22.96416325s] [22.96416325s] END 2026-02-23T14:27:08.399445687Z I0223 14:27:08.399389 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.500541733Z I0223 14:27:08.499961 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.505516066Z I0223 14:27:08.505440 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.600106377Z I0223 14:27:08.600015 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.604298400Z I0223 14:27:08.604238 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.701143521Z I0223 14:27:08.701057 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.804497237Z I0223 14:27:08.804424 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.809580243Z I0223 14:27:08.809542 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.820133997Z I0223 14:27:08.820080 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.828458061Z I0223 14:27:08.828405 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:08.887017873Z I0223 14:27:08.886957 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:09.087758275Z I0223 14:27:09.087674 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:09.288059615Z I0223 14:27:09.287969 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:09.487138573Z I0223 14:27:09.487046 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:09.688542042Z I0223 14:27:09.688418 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:09.939931905Z I0223 14:27:09.939869 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:10.087837647Z I0223 14:27:10.087775 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:10.288797925Z I0223 14:27:10.288007 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:10.488228672Z I0223 14:27:10.488103 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:10.687237297Z I0223 14:27:10.687131 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:10.937671053Z I0223 14:27:10.937619 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:11.088043222Z I0223 14:27:11.087985 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:11.243016094Z E0223 14:27:11.242935 1 remote_available_controller.go:470] "Unhandled Error" err="v1.project.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/project.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.246088807Z E0223 14:27:11.245790 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.246321233Z E0223 14:27:11.246222 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.62:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.62:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.246798796Z E0223 14:27:11.246742 1 remote_available_controller.go:470] "Unhandled Error" err="v1.security.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.249314313Z E0223 14:27:11.249268 1 remote_available_controller.go:470] "Unhandled Error" err="v1.build.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/build.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.261267944Z E0223 14:27:11.260419 1 remote_available_controller.go:470] "Unhandled Error" err="v1.oauth.openshift.io failed with: failing or missing response from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.268396136Z E0223 14:27:11.268322 1 remote_available_controller.go:470] "Unhandled Error" err="v1.route.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.268466738Z E0223 14:27:11.268431 1 remote_available_controller.go:470] "Unhandled Error" err="v1.quota.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/quota.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.269581048Z E0223 14:27:11.269545 1 remote_available_controller.go:470] "Unhandled Error" err="v1.image.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/image.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.269606848Z E0223 14:27:11.269575 1 remote_available_controller.go:470] "Unhandled Error" err="v1.template.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.273512483Z E0223 14:27:11.271908 1 remote_available_controller.go:470] "Unhandled Error" err="v1.user.openshift.io failed with: failing or missing response from https://10.128.0.34:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/user.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.277010337Z E0223 14:27:11.276886 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-02-23T14:27:11.287686474Z I0223 14:27:11.287627 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:11.337298197Z I0223 14:27:11.337207 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=9 seatDemandAvg=0.647201061568289 seatDemandStdev=0.6609781376897593 seatDemandSmoothed=15.061340596535759 fairFrac=2.254533391756286 currentCL=9 concurrencyDenominator=9 backstop=false 2026-02-23T14:27:11.487212623Z I0223 14:27:11.487088 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:11.688149110Z I0223 14:27:11.688071 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:11.888074680Z I0223 14:27:11.887985 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-23T14:27:12.087295831Z I0223 14:27:12.087204 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015147061704031150 0ustar00000000000000002026-02-23T14:16:38.566791866Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115147061704037121 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-5d87bf58c-nq2tz2026-02-23T14:26:46.605199620Z I0223 14:26:46.604989 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T14:26:46.605552950Z I0223 14:26:46.605463 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:26:46.607018739Z I0223 14:26:46.606935 1 observer_polling.go:159] Starting file observer 2026-02-23T14:26:52.858433030Z I0223 14:26:52.858339 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-23T14:26:59.224445920Z I0223 14:26:59.224374 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T14:26:59.224445920Z W0223 14:26:59.224409 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:26:59.224445920Z W0223 14:26:59.224417 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:26:59.224445920Z W0223 14:26:59.224423 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T14:26:59.224445920Z W0223 14:26:59.224427 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T14:26:59.224445920Z W0223 14:26:59.224431 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T14:26:59.224445920Z W0223 14:26:59.224435 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T14:26:59.238506607Z I0223 14:26:59.234685 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T14:26:59.238506607Z I0223 14:26:59.234749 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T14:26:59.238506607Z I0223 14:26:59.234757 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T14:26:59.238506607Z I0223 14:26:59.234797 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T14:26:59.238506607Z I0223 14:26:59.234818 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:26:59.238506607Z I0223 14:26:59.234831 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-23T14:26:59.238506607Z I0223 14:26:59.234838 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T14:26:59.238506607Z I0223 14:26:59.234849 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:26:59.238506607Z I0223 14:26:59.234910 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T14:26:59.238506607Z I0223 14:26:59.235691 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-23T14:26:59.238506607Z I0223 14:26:59.235971 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-02-23T14:26:59.335986396Z I0223 14:26:59.335872 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:26:59.335986396Z I0223 14:26:59.335904 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T14:26:59.335986396Z I0223 14:26:59.335948 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007420415147061704025206 0ustar00000000000000002026-02-23T14:19:46.910343427Z 2026-02-23T14:19:46.910343427Z cluster-etcd-operator rev \ 2026-02-23T14:19:46.910343427Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-02-23T14:19:46.910343427Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-02-23T14:19:46.910343427Z --client-key-file=$(ETCDCTL_KEY) \ 2026-02-23T14:19:46.910343427Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-02-23T14:19:46.910343427Z securityContext: 2026-02-23T14:19:46.910343427Z privileged: true 2026-02-23T14:19:46.910343427Z resources: 2026-02-23T14:19:46.910343427Z requests: 2026-02-23T14:19:46.910343427Z memory: 50Mi 2026-02-23T14:19:46.910343427Z cpu: 10m 2026-02-23T14:19:46.910343427Z env: 2026-02-23T14:19:46.910343427Z - name: "ALL_ETCD_ENDPOINTS" 2026-02-23T14:19:46.910343427Z value: "https://192.168.32.10:2379" 2026-02-23T14:19:46.910343427Z - name: "ETCDCTL_API" 2026-02-23T14:19:46.910343427Z value: "3" 2026-02-23T14:19:46.910343427Z - name: "ETCDCTL_CACERT" 2026-02-23T14:19:46.910343427Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-02-23T14:19:46.910343427Z - name: "ETCDCTL_CERT" 2026-02-23T14:19:46.910343427Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-02-23T14:19:46.910343427Z - name: "ETCDCTL_ENDPOINTS" 2026-02-23T14:19:46.910343427Z value: "https://192.168.32.10:2379" 2026-02-23T14:19:46.910343427Z - name: "ETCDCTL_KEY" 2026-02-23T14:19:46.910343427Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-02-23T14:19:46.910343427Z - name: "ETCD_CIPHER_SUITES" 2026-02-23T14:19:46.910343427Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-02-23T14:19:46.910343427Z - name: "ETCD_DATA_DIR" 2026-02-23T14:19:46.910343427Z value: "/var/lib/etcd" 2026-02-23T14:19:46.910343427Z - name: "ETCD_ELECTION_TIMEOUT" 2026-02-23T14:19:46.910343427Z value: "2500" 2026-02-23T14:19:46.910343427Z - name: "ETCD_ENABLE_PPROF" 2026-02-23T14:19:46.910343427Z value: "true" 2026-02-23T14:19:46.910343427Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-02-23T14:19:46.910343427Z value: "1" 2026-02-23T14:19:46.910343427Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-02-23T14:19:46.910445719Z value: "200ms" 2026-02-23T14:19:46.910445719Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-02-23T14:19:46.910445719Z value: "5s" 2026-02-23T14:19:46.910445719Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-02-23T14:19:46.910445719Z value: "500" 2026-02-23T14:19:46.910445719Z - name: "ETCD_IMAGE" 2026-02-23T14:19:46.910445719Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef" 2026-02-23T14:19:46.910445719Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-02-23T14:19:46.910445719Z value: "existing" 2026-02-23T14:19:46.910445719Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-02-23T14:19:46.910445719Z value: "8589934592" 2026-02-23T14:19:46.910445719Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-02-23T14:19:46.910445719Z value: "true" 2026-02-23T14:19:46.910445719Z - name: "ETCD_TLS_MIN_VERSION" 2026-02-23T14:19:46.910445719Z value: "TLS1.2" 2026-02-23T14:19:46.910445719Z - name: "NODE_master_0_ETCD_NAME" 2026-02-23T14:19:46.910445719Z value: "master-0" 2026-02-23T14:19:46.910445719Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-02-23T14:19:46.910445719Z value: "192.168.32.10" 2026-02-23T14:19:46.910445719Z - name: "NODE_master_0_IP" 2026-02-23T14:19:46.910445719Z value: "192.168.32.10" 2026-02-23T14:19:46.910445719Z volumeMounts: 2026-02-23T14:19:46.910445719Z - mountPath: /var/lib/etcd 2026-02-23T14:19:46.910445719Z name: data-dir 2026-02-23T14:19:46.910445719Z - mountPath: /etc/kubernetes/static-pod-certs 2026-02-23T14:19:46.910445719Z name: cert-dir 2026-02-23T14:19:46.910445719Z hostNetwork: true 2026-02-23T14:19:46.910445719Z priorityClassName: system-node-critical 2026-02-23T14:19:46.910445719Z tolerations: 2026-02-23T14:19:46.910445719Z - operator: "Exists" 2026-02-23T14:19:46.910445719Z volumes: 2026-02-23T14:19:46.910445719Z - hostPath: 2026-02-23T14:19:46.910445719Z path: /etc/kubernetes/manifests 2026-02-23T14:19:46.910445719Z name: static-pod-dir 2026-02-23T14:19:46.910445719Z - hostPath: 2026-02-23T14:19:46.910445719Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-02-23T14:19:46.910445719Z name: resource-dir 2026-02-23T14:19:46.910445719Z - hostPath: 2026-02-23T14:19:46.910445719Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-02-23T14:19:46.910445719Z name: cert-dir 2026-02-23T14:19:46.910445719Z - hostPath: 2026-02-23T14:19:46.910445719Z path: /var/lib/etcd 2026-02-23T14:19:46.910445719Z type: "" 2026-02-23T14:19:46.910445719Z name: data-dir 2026-02-23T14:19:46.910445719Z - hostPath: 2026-02-23T14:19:46.910445719Z path: /usr/local/bin 2026-02-23T14:19:46.910445719Z name: usr-local-bin 2026-02-23T14:19:46.910445719Z - hostPath: 2026-02-23T14:19:46.910445719Z path: /var/log/etcd 2026-02-23T14:19:46.910445719Z name: log-dir 2026-02-23T14:19:46.910445719Z - hostPath: 2026-02-23T14:19:46.910445719Z path: /etc/kubernetes 2026-02-23T14:19:46.910445719Z name: config-dir 2026-02-23T14:19:46.910445719Z - hostPath: 2026-02-23T14:19:46.910445719Z path: /var/lib/etcd-auto-backup 2026-02-23T14:19:46.910445719Z name: etcd-auto-backup-dir 2026-02-23T14:19:46.991532265Z I0223 14:19:46.991446 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-02-23T14:19:46.992716860Z I0223 14:19:46.992690 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-23T14:19:46.992735581Z I0223 14:19:46.992707 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-23T14:19:46.992735581Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-23T14:20:01.107057352Z W0223 14:20:01.106896 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.1896e5ff0bb70cd1.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:5f67ab24-82bc-4e71-b974-e25b819986c8,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-02-23 14:19:46.992835793 +0000 UTC m=+30.707625956,LastTimestamp:2026-02-23 14:19:46.992835793 +0000 UTC m=+30.707625956,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: the server was unable to return a response in the time allotted, but may still be processing the request (post events) machine-api-operator_current.log0000640000000000000000000003650415147061704033230 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-5c7cf458b4-bb7zl2026-02-23T14:20:08.992364903Z I0223 14:20:08.992111 1 start.go:72] Version: 4.18.0-202601302238.p2.g609dbab.assembly.stream.el9 2026-02-23T14:20:08.992529506Z I0223 14:20:08.992470 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:21:09.007203003Z W0223 14:21:09.007101 1 leaderelection.go:51] unable to get cluster infrastructure status, using HA cluster values for leader election: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster) 2026-02-23T14:21:09.011544029Z I0223 14:21:09.011409 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/machine-api-operator... 2026-02-23T14:22:09.014934838Z E0223 14:22:09.014828 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/machine-api-operator: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io machine-api-operator) 2026-02-23T14:23:38.214295363Z E0223 14:23:38.214233 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/machine-api-operator: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io machine-api-operator) 2026-02-23T14:25:27.664155929Z E0223 14:25:27.663995 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/machine-api-operator: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io machine-api-operator) 2026-02-23T14:26:45.276360078Z I0223 14:26:45.275310 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/machine-api-operator 2026-02-23T14:26:52.858558084Z I0223 14:26:52.858117 1 operator.go:217] Starting Machine API Operator 2026-02-23T14:26:52.858558084Z I0223 14:26:52.858234 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T14:26:52.858558084Z I0223 14:26:52.858248 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T14:26:52.858558084Z I0223 14:26:52.858268 1 reflector.go:305] Starting reflector *v1.Deployment (12m32.660924107s) from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.858558084Z I0223 14:26:52.858277 1 reflector.go:341] Listing and watching *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.858588564Z I0223 14:26:52.858572 1 reflector.go:305] Starting reflector *v1.DaemonSet (12m32.660924107s) from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.858588564Z I0223 14:26:52.858581 1 reflector.go:341] Listing and watching *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.858784340Z I0223 14:26:52.858756 1 reflector.go:305] Starting reflector *v1beta1.Machine (15m8.78942853s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-02-23T14:26:52.858818311Z I0223 14:26:52.858807 1 reflector.go:341] Listing and watching *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-02-23T14:26:52.858861622Z I0223 14:26:52.858838 1 reflector.go:305] Starting reflector *v1.ClusterOperator (14m56.746685007s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.858861622Z I0223 14:26:52.858853 1 reflector.go:341] Listing and watching *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.859065737Z I0223 14:26:52.859038 1 reflector.go:305] Starting reflector *v1.ValidatingWebhookConfiguration (12m32.660924107s) from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.859065737Z I0223 14:26:52.859051 1 reflector.go:341] Listing and watching *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.859171350Z I0223 14:26:52.859148 1 reflector.go:305] Starting reflector *v1.MutatingWebhookConfiguration (12m32.660924107s) from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.859171350Z I0223 14:26:52.859160 1 reflector.go:341] Listing and watching *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.859265723Z I0223 14:26:52.859243 1 reflector.go:305] Starting reflector *v1.FeatureGate (14m56.746685007s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.859265723Z I0223 14:26:52.859254 1 reflector.go:341] Listing and watching *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.859373825Z I0223 14:26:52.859351 1 reflector.go:305] Starting reflector *v1.Proxy (14m56.746685007s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.859373825Z I0223 14:26:52.859362 1 reflector.go:341] Listing and watching *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.859438307Z I0223 14:26:52.859424 1 reflector.go:305] Starting reflector *v1.ClusterVersion (14m56.746685007s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.859465348Z I0223 14:26:52.859455 1 reflector.go:341] Listing and watching *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.859592731Z I0223 14:26:52.858778 1 reflector.go:305] Starting reflector *v1beta1.MachineSet (15m8.78942853s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-02-23T14:26:52.859630822Z I0223 14:26:52.859619 1 reflector.go:341] Listing and watching *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-02-23T14:26:52.866812235Z I0223 14:26:52.862979 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.866812235Z I0223 14:26:52.863198 1 reflector.go:368] Caches populated for *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.867504634Z I0223 14:26:52.867461 1 reflector.go:368] Caches populated for *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-02-23T14:26:52.869913499Z I0223 14:26:52.868349 1 reflector.go:368] Caches populated for *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.870077383Z I0223 14:26:52.868969 1 reflector.go:368] Caches populated for *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-02-23T14:26:52.870220697Z I0223 14:26:52.869007 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.870411932Z I0223 14:26:52.869263 1 reflector.go:368] Caches populated for *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.870555886Z I0223 14:26:52.869509 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.877722948Z I0223 14:26:52.876090 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2026-02-23T14:26:52.895890846Z I0223 14:26:52.895570 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-02-23T14:26:52.960887751Z I0223 14:26:52.960800 1 operator.go:229] Synced up caches 2026-02-23T14:26:52.961015995Z I0223 14:26:52.960998 1 operator.go:234] Started feature gate accessor 2026-02-23T14:26:52.961095297Z I0223 14:26:52.961075 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-23T14:26:52.962404962Z I0223 14:26:52.962377 1 start.go:121] Synced up machine api informer caches 2026-02-23T14:26:52.963822590Z I0223 14:26:52.963675 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-machine-api", Name:"machine-api-operator", UID:"c9c1671c-8690-4fb0-9a10-e633a06afdd9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-02-23T14:26:57.535375611Z I0223 14:26:57.535261 1 status.go:63] Syncing status: progressing 2026-02-23T14:26:57.535688879Z I0223 14:26:57.535640 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterOperator", Namespace:"", Name:"machine-api", UID:"c07b493c-156a-4a26-be3b-27866de0aa3d", APIVersion:"config.openshift.io/v1", ResourceVersion:"9795", FieldPath:""}): type: 'Normal' reason: 'Status upgrade' Progressing towards operator: 4.18.33 2026-02-23T14:26:57.544461405Z I0223 14:26:57.544418 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-02-23T14:26:57.548109573Z I0223 14:26:57.548012 1 status.go:99] Syncing status: available 2026-02-23T14:26:57.700839765Z I0223 14:26:57.700751 1 request.go:632] Waited for 138.234673ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-02-23T14:26:57.901220927Z I0223 14:26:57.901115 1 request.go:632] Waited for 195.08499ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-02-23T14:26:57.905126492Z I0223 14:26:57.905035 1 status.go:69] Syncing status: re-syncing 2026-02-23T14:26:58.100934552Z I0223 14:26:58.100771 1 request.go:632] Waited for 195.44583ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status 2026-02-23T14:26:58.109848501Z I0223 14:26:58.109752 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-02-23T14:26:58.301242662Z I0223 14:26:58.301164 1 request.go:632] Waited for 191.265737ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-02-23T14:26:58.305592479Z I0223 14:26:58.305529 1 status.go:99] Syncing status: available 2026-02-23T14:26:58.500838763Z I0223 14:26:58.500731 1 request.go:632] Waited for 195.045329ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status 2026-02-23T14:26:58.700543178Z I0223 14:26:58.700371 1 request.go:632] Waited for 190.393565ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/infrastructures/cluster 2026-02-23T14:26:58.901153796Z I0223 14:26:58.901048 1 request.go:632] Waited for 196.190689ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/proxies/cluster 2026-02-23T14:26:59.100413438Z I0223 14:26:59.100292 1 request.go:632] Waited for 196.279482ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-02-23T14:26:59.300576345Z I0223 14:26:59.300501 1 request.go:632] Waited for 196.358204ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-02-23T14:26:59.304699755Z I0223 14:26:59.304642 1 status.go:69] Syncing status: re-syncing 2026-02-23T14:26:59.500499335Z I0223 14:26:59.500354 1 request.go:632] Waited for 195.487801ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status 2026-02-23T14:26:59.508933311Z I0223 14:26:59.508853 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-02-23T14:26:59.700338282Z I0223 14:26:59.700242 1 request.go:632] Waited for 191.291358ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-02-23T14:26:59.705118691Z I0223 14:26:59.705048 1 status.go:99] Syncing status: available 2026-02-23T14:26:59.901397713Z I0223 14:26:59.901290 1 request.go:632] Waited for 196.020545ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status kube-rbac-proxy_current.log0000640000000000000000000001524715147061704032237 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-5c7cf458b4-bb7zl2026-02-23T14:19:43.040589751Z I0223 14:19:43.039075 1 flags.go:64] FLAG: --add-dir-header="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039242 1 flags.go:64] FLAG: --allow-paths="[]" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039255 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039258 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039261 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039265 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039268 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039271 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039275 1 flags.go:64] FLAG: --client-ca-file="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039278 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039281 1 flags.go:64] FLAG: --help="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039284 1 flags.go:64] FLAG: --http2-disable="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039286 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039291 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039294 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039298 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039300 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039304 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039308 1 flags.go:64] FLAG: --kubeconfig="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039311 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039313 1 flags.go:64] FLAG: --log-dir="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039316 1 flags.go:64] FLAG: --log-file="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039319 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039322 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039326 1 flags.go:64] FLAG: --logtostderr="true" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039329 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039331 1 flags.go:64] FLAG: --oidc-clientID="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039334 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039337 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039341 1 flags.go:64] FLAG: --oidc-issuer="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039343 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039348 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039351 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039354 1 flags.go:64] FLAG: --one-output="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039356 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039359 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039362 1 flags.go:64] FLAG: --skip-headers="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039365 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039367 1 flags.go:64] FLAG: --stderrthreshold="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039370 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039373 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039383 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039386 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039389 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039393 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039397 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039400 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039402 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039405 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039408 1 flags.go:64] FLAG: --v="3" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039410 1 flags.go:64] FLAG: --version="false" 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039415 1 flags.go:64] FLAG: --vmodule="" 2026-02-23T14:19:43.040589751Z W0223 14:19:43.039425 1 deprecated.go:66] 2026-02-23T14:19:43.040589751Z ==== Removed Flag Warning ====================== 2026-02-23T14:19:43.040589751Z 2026-02-23T14:19:43.040589751Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-23T14:19:43.040589751Z 2026-02-23T14:19:43.040589751Z =============================================== 2026-02-23T14:19:43.040589751Z 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039434 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-02-23T14:19:43.040589751Z I0223 14:19:43.039940 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-23T14:19:43.041356728Z I0223 14:19:43.041081 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-23T14:19:43.041429539Z I0223 14:19:43.041373 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-23T14:19:43.041750196Z I0223 14:19:43.041712 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 config/pod/openshift-machine-api/machine-api-operator-5c7cf458b4-bb7zl.json0000640000000000000000000001702615147061704024763 0ustar0000000000000000{"metadata":{"name":"machine-api-operator-5c7cf458b4-bb7zl","generateName":"machine-api-operator-5c7cf458b4-","namespace":"openshift-machine-api","uid":"ceba7b56-f910-473d-aed5-add94868fb31","resourceVersion":"9095","creationTimestamp":"2026-02-23T14:19:31Z","labels":{"k8s-app":"machine-api-operator","pod-template-hash":"5c7cf458b4"},"annotations":{"capability.openshift.io/name":"MachineAPI","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.57/23\"],\"mac_address\":\"0a:58:0a:80:00:39\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.57/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.57\"\n ],\n \"mac\": \"0a:58:0a:80:00:39\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"machine-api-operator","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-api-operator-5c7cf458b4","uid":"ccb0a81a-8f41-4f33-a364-30c4d61bdb59","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"images","configMap":{"name":"machine-api-operator-images","defaultMode":420}},{"name":"machine-api-operator-tls","secret":{"secretName":"machine-api-operator-tls","defaultMode":420}},{"name":"kube-api-access-72769","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-api-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-72769","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000490000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"machine-api-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:572b0ca6e993beea2ee9346197665e56a2e4999fbb6958c747c48a35bf72ee34","command":["/machine-api-operator"],"args":["start","--images-json=/etc/machine-api-operator-config/images/images.json","--alsologtostderr","--v=3"],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"images","mountPath":"/etc/machine-api-operator-config/images"},{"name":"kube-api-access-72769","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000490000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-api-operator","serviceAccount":"machine-api-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c14"},"fsGroup":1000490000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"machine-api-operator-dockercfg-5wrwc"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:31Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:31Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:31Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-rbac-proxy machine-api-operator]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:31Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-rbac-proxy machine-api-operator]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:31Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T14:19:31Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"waiting":{"reason":"ContainerCreating"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"","started":false,"volumeMounts":[{"name":"config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-api-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-72769","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-api-operator","state":{"waiting":{"reason":"ContainerCreating"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:572b0ca6e993beea2ee9346197665e56a2e4999fbb6958c747c48a35bf72ee34","imageID":"","started":false,"volumeMounts":[{"name":"images","mountPath":"/etc/machine-api-operator-config/images"},{"name":"kube-api-access-72769","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}control-plane-machine-set-operator_current.log0000640000000000000000000001766615147061704040340 0ustar0000000000000000config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-686847ff5f-9q2662026-02-23T14:22:33.786690001Z I0223 14:22:33.786503 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:22:33.787376428Z I0223 14:22:33.787329 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-23T14:22:33.796249498Z I0223 14:22:33.796206 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.1896e625e1f78b0e dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:FeatureGatesInitialized,Message:FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}},Source:EventSource{Component:,Host:,},FirstTimestamp:2026-02-23 14:22:33.796143886 +0000 UTC m=+0.048408722,LastTimestamp:2026-02-23 14:22:33.796143886 +0000 UTC m=+0.048408722,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-02-23T14:22:33.796296999Z I0223 14:22:33.796231 1 main.go:175] FeatureGates initialized: [AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-02-23T14:22:33.796389912Z I0223 14:22:33.796362 1 webhook.go:186] "skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" 2026-02-23T14:22:33.796420333Z I0223 14:22:33.796395 1 webhook.go:202] "Registering a validating webhook" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-02-23T14:22:33.796472654Z I0223 14:22:33.796448 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-02-23T14:22:33.796534585Z I0223 14:22:33.796504 1 main.go:230] "starting manager" logger="setup" 2026-02-23T14:22:33.796834703Z I0223 14:22:33.796790 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-02-23T14:22:33.796977956Z I0223 14:22:33.796909 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false 2026-02-23T14:22:33.797065899Z I0223 14:22:33.797044 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-02-23T14:22:33.797136390Z I0223 14:22:33.797082 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2026-02-23T14:22:33.797186302Z I0223 14:22:33.797156 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/control-plane-machine-set-leader... 2026-02-23T14:22:33.797939970Z I0223 14:22:33.797350 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-02-23T14:22:33.797939970Z I0223 14:22:33.797404 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2026-02-23T14:22:33.797939970Z I0223 14:22:33.797498 1 certwatcher.go:115] "Starting certificate watcher" logger="controller-runtime.certwatcher" 2026-02-23T14:23:33.801399545Z E0223 14:23:33.801280 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/control-plane-machine-set-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io control-plane-machine-set-leader) 2026-02-23T14:25:03.902999404Z E0223 14:25:03.902882 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/control-plane-machine-set-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io control-plane-machine-set-leader) baremetal-kube-rbac-proxy_current.log0000640000000000000000000001552515147061704035334 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-d6bb9bb76-4frj62026-02-23T14:19:43.573560954Z I0223 14:19:43.572693 1 flags.go:64] FLAG: --add-dir-header="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572806 1 flags.go:64] FLAG: --allow-paths="[]" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572813 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572816 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572818 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572822 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572825 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572828 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572831 1 flags.go:64] FLAG: --client-ca-file="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572834 1 flags.go:64] FLAG: --config-file="/etc/baremetal-kube-rbac-proxy/config-file.yaml" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572837 1 flags.go:64] FLAG: --help="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572840 1 flags.go:64] FLAG: --http2-disable="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572843 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572846 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572849 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572853 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572856 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572859 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572863 1 flags.go:64] FLAG: --kubeconfig="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572865 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572868 1 flags.go:64] FLAG: --log-dir="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572871 1 flags.go:64] FLAG: --log-file="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572873 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572877 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572881 1 flags.go:64] FLAG: --logtostderr="true" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572883 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572886 1 flags.go:64] FLAG: --oidc-clientID="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572888 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572891 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572899 1 flags.go:64] FLAG: --oidc-issuer="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572901 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572909 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572912 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572914 1 flags.go:64] FLAG: --one-output="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572917 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572920 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572922 1 flags.go:64] FLAG: --skip-headers="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572925 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572928 1 flags.go:64] FLAG: --stderrthreshold="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572930 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572933 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572940 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572944 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572947 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572950 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572953 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572956 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572958 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572961 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572964 1 flags.go:64] FLAG: --v="10" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572966 1 flags.go:64] FLAG: --version="false" 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572971 1 flags.go:64] FLAG: --vmodule="" 2026-02-23T14:19:43.573560954Z W0223 14:19:43.572980 1 deprecated.go:66] 2026-02-23T14:19:43.573560954Z ==== Removed Flag Warning ====================== 2026-02-23T14:19:43.573560954Z 2026-02-23T14:19:43.573560954Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-23T14:19:43.573560954Z 2026-02-23T14:19:43.573560954Z =============================================== 2026-02-23T14:19:43.573560954Z 2026-02-23T14:19:43.573560954Z I0223 14:19:43.572989 1 kube-rbac-proxy.go:530] Reading config file: /etc/baremetal-kube-rbac-proxy/config-file.yaml 2026-02-23T14:19:43.573560954Z I0223 14:19:43.573463 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-23T14:19:43.577510879Z I0223 14:19:43.574415 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-23T14:19:43.577510879Z I0223 14:19:43.574512 1 reloader.go:99] reloading key /etc/tls/private/tls.key certificate /etc/tls/private/tls.crt 2026-02-23T14:19:43.577510879Z I0223 14:19:43.574708 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-23T14:19:43.577510879Z I0223 14:19:43.574981 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 cluster-baremetal-operator_current.log0000640000000000000000000000635515147061704035635 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-d6bb9bb76-4frj62026-02-23T14:26:57.509259349Z I0223 14:26:57.506337 1 webhook.go:104] WebhookDependenciesReady: everything ready for webhooks 2026-02-23T14:26:57.523209914Z I0223 14:26:57.523121 1 clusteroperator.go:235] "new CO status" reason="WaitingForProvisioningCR" processMessage="" message="Waiting for Provisioning CR on BareMetal Platform" 2026-02-23T14:27:05.932905597Z I0223 14:27:05.932810 1 provisioning_controller.go:651] "Network stack calculation" NetworkStack=1 2026-02-23T14:27:05.942603188Z I0223 14:27:05.942535 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.1896e6653f2546bf dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ValidatingWebhookConfigurationUpdated,Message:Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cluster-baremetal-validating-webhook-configuration because it changed,Source:EventSource{Component:,Host:,},FirstTimestamp:2026-02-23 14:27:05.942361791 +0000 UTC m=+52.559807764,LastTimestamp:2026-02-23 14:27:05.942361791 +0000 UTC m=+52.559807764,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-02-23T14:27:05.942709291Z I0223 14:27:05.942670 1 webhook.go:177] "msg"="skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" 2026-02-23T14:27:05.942778272Z I0223 14:27:05.942745 1 webhook.go:193] "msg"="Registering a validating webhook" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-02-23T14:27:05.942872825Z I0223 14:27:05.942839 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-02-23T14:27:05.942940647Z I0223 14:27:05.942909 1 main.go:180] starting manager 2026-02-23T14:27:05.943246015Z I0223 14:27:05.943191 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-02-23T14:27:05.943655676Z I0223 14:27:05.943593 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-02-23T14:27:05.943784140Z I0223 14:27:05.943729 1 server.go:247] "msg"="Serving metrics server" "bindAddress"=":8080" "logger"="controller-runtime.metrics" "secure"=false 2026-02-23T14:27:05.944135829Z I0223 14:27:05.944084 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-02-23T14:27:05.944323734Z I0223 14:27:05.944276 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=9443 2026-02-23T14:27:05.944510759Z I0223 14:27:05.944441 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-02-23T14:27:06.044345141Z I0223 14:27:06.044198 1 leaderelection.go:250] attempting to acquire leader lease openshift-machine-api/cluster-baremetal-operator... cluster-autoscaler-operator_current.log0000640000000000000000000000445115147061704036270 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-86b8dc6d6-2kvfp2026-02-23T14:25:59.187545370Z I0223 14:25:59.187324 1 main.go:15] Go Version: go1.22.12 (Red Hat 1.22.12-3.el9_5) X:strictfipsruntime 2026-02-23T14:25:59.187545370Z I0223 14:25:59.187497 1 main.go:16] Go OS/Arch: linux/amd64 2026-02-23T14:25:59.187545370Z I0223 14:25:59.187501 1 main.go:17] Version: cluster-autoscaler-operator v4.18.0-202601302238.p2.g474ad65.assembly.stream.el9+ose-cluster-autoscaler-operator 2026-02-23T14:25:59.187713624Z I0223 14:25:59.187683 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:26:57.507585015Z I0223 14:26:57.506098 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-clusterautoscalers" 2026-02-23T14:26:57.507585015Z I0223 14:26:57.506192 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-machineautoscalers" 2026-02-23T14:26:57.507585015Z I0223 14:26:57.506460 1 main.go:41] Starting cluster-autoscaler-operator 2026-02-23T14:26:57.509405823Z I0223 14:26:57.507993 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-02-23T14:26:57.509405823Z I0223 14:26:57.508269 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-02-23T14:26:57.509405823Z I0223 14:26:57.508614 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/cluster-autoscaler-operator-leader... 2026-02-23T14:26:57.509405823Z I0223 14:26:57.508797 1 server.go:247] "msg"="Serving metrics server" "bindAddress"="127.0.0.1:9191" "logger"="controller-runtime.metrics" "secure"=false 2026-02-23T14:26:57.509405823Z I0223 14:26:57.509360 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-02-23T14:26:57.509971899Z I0223 14:26:57.509847 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-02-23T14:26:57.509971899Z I0223 14:26:57.509960 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=8443 kube-rbac-proxy_current.log0000640000000000000000000001524715147061704033635 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-86b8dc6d6-2kvfp2026-02-23T14:19:30.409996450Z I0223 14:19:30.409126 1 flags.go:64] FLAG: --add-dir-header="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409281 1 flags.go:64] FLAG: --allow-paths="[]" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409291 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409295 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409298 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409304 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409308 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409312 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409316 1 flags.go:64] FLAG: --client-ca-file="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409320 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409324 1 flags.go:64] FLAG: --help="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409327 1 flags.go:64] FLAG: --http2-disable="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409331 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409336 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409339 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409344 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409347 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409352 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409356 1 flags.go:64] FLAG: --kubeconfig="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409359 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409363 1 flags.go:64] FLAG: --log-dir="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409367 1 flags.go:64] FLAG: --log-file="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409371 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409376 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409380 1 flags.go:64] FLAG: --logtostderr="true" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409384 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409388 1 flags.go:64] FLAG: --oidc-clientID="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409391 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409395 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409399 1 flags.go:64] FLAG: --oidc-issuer="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409403 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409409 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409413 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409417 1 flags.go:64] FLAG: --one-output="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409421 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409424 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:9192" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409429 1 flags.go:64] FLAG: --skip-headers="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409434 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409438 1 flags.go:64] FLAG: --stderrthreshold="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409441 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409445 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409457 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409462 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409466 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409496 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:9191/" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409501 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409505 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409508 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409512 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409515 1 flags.go:64] FLAG: --v="3" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409519 1 flags.go:64] FLAG: --version="false" 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409526 1 flags.go:64] FLAG: --vmodule="" 2026-02-23T14:19:30.409996450Z W0223 14:19:30.409539 1 deprecated.go:66] 2026-02-23T14:19:30.409996450Z ==== Removed Flag Warning ====================== 2026-02-23T14:19:30.409996450Z 2026-02-23T14:19:30.409996450Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-23T14:19:30.409996450Z 2026-02-23T14:19:30.409996450Z =============================================== 2026-02-23T14:19:30.409996450Z 2026-02-23T14:19:30.409996450Z I0223 14:19:30.409552 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-02-23T14:19:30.410601653Z I0223 14:19:30.410198 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-23T14:19:30.413098787Z I0223 14:19:30.413057 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-23T14:19:30.413514946Z I0223 14:19:30.413417 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9192 2026-02-23T14:19:30.417498932Z I0223 14:19:30.413715 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9192 config/pod/openshift-machine-api/cluster-autoscaler-operator-86b8dc6d6-2kvfp.json0000640000000000000000000002016515147061704026357 0ustar0000000000000000{"metadata":{"name":"cluster-autoscaler-operator-86b8dc6d6-2kvfp","generateName":"cluster-autoscaler-operator-86b8dc6d6-","namespace":"openshift-machine-api","uid":"3d3f4da5-d82d-40b7-9aaf-53ae6eb4aca3","resourceVersion":"9087","creationTimestamp":"2026-02-23T14:19:28Z","labels":{"k8s-app":"cluster-autoscaler-operator","pod-template-hash":"86b8dc6d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.49/23\"],\"mac_address\":\"0a:58:0a:80:00:31\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.49/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.49\"\n ],\n \"mac\": \"0a:58:0a:80:00:31\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"cluster-autoscaler-operator","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-autoscaler-operator-86b8dc6d6","uid":"609b7b5e-e99e-4f5c-b361-97eee5e127c3","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-autoscaler-operator-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420}},{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy-cluster-autoscaler-operator","defaultMode":420}},{"name":"kube-api-access-qtbcj","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:9192","--upstream=http://127.0.0.1:9191/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"metrics","containerPort":9192,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","readOnly":true,"mountPath":"/etc/kube-rbac-proxy"},{"name":"cert","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-qtbcj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000490000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"cluster-autoscaler-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6","command":["cluster-autoscaler-operator"],"args":["-alsologtostderr"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"CLUSTER_AUTOSCALER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"LEADER_ELECTION_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"CLUSTER_AUTOSCALER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5f21a128b2caf150554d523669a2f456815db7a51fb86f96d37f2e8ef7084894"},{"name":"WEBHOOKS_CERT_DIR","value":"/etc/cluster-autoscaler-operator/tls"},{"name":"WEBHOOKS_PORT","value":"8443"},{"name":"METRICS_PORT","value":"9191"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-autoscaler-operator/tls"},{"name":"kube-api-access-qtbcj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000490000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-autoscaler-operator","serviceAccount":"cluster-autoscaler-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c14"},"fsGroup":1000490000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"cluster-autoscaler-operator-dockercfg-dnwls"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:28Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:28Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-rbac-proxy cluster-autoscaler-operator]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:28Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-rbac-proxy cluster-autoscaler-operator]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T14:19:28Z","containerStatuses":[{"name":"cluster-autoscaler-operator","state":{"waiting":{"reason":"ContainerCreating"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6","imageID":"","started":false,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-autoscaler-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-qtbcj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"waiting":{"reason":"ContainerCreating"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"","started":false,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"cert","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-qtbcj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-oauth-apiserver/logs/apiserver-67f44b4d6d-7lpn4/oauth-apiserver_current.log0000640000000000000000000011623415147061704031303 0ustar00000000000000002026-02-23T14:24:42.700972614Z E0223 14:24:42.700552 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:24:44.025567728Z W0223 14:24:44.025369 1 logging.go:55] [core] [Channel #47 SubChannel #48]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T14:24:46.783684014Z W0223 14:24:46.783556 1 logging.go:55] [core] [Channel #47 SubChannel #48]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T14:24:48.131681378Z W0223 14:24:48.131565 1 logging.go:55] [core] [Channel #17 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T14:24:48.608472699Z W0223 14:24:48.608380 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T14:24:50.787720332Z W0223 14:24:50.787594 1 logging.go:55] [core] [Channel #47 SubChannel #48]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T14:24:50.792129106Z W0223 14:24:50.792074 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T14:24:53.097911621Z W0223 14:24:53.097803 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T14:24:56.867363767Z W0223 14:24:56.867281 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T14:24:57.020842474Z W0223 14:24:57.020783 1 logging.go:55] [core] [Channel #47 SubChannel #48]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-23T14:25:11.245894941Z E0223 14:25:11.245817 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.245954243Z E0223 14:25:11.245880 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.246227990Z E0223 14:25:11.246179 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.246893137Z E0223 14:25:11.246545 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.246893137Z E0223 14:25:11.246581 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.261794790Z E0223 14:25:11.261721 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.261794790Z E0223 14:25:11.261785 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.261866942Z E0223 14:25:11.261823 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.261951894Z E0223 14:25:11.261914 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:11.262378975Z E0223 14:25:11.262317 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.643617775Z E0223 14:25:12.643125 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.643617775Z E0223 14:25:12.643281 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.643617775Z E0223 14:25:12.643366 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.643617775Z E0223 14:25:12.643433 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.643678227Z E0223 14:25:12.643661 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.709835627Z E0223 14:25:12.709786 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.709926479Z E0223 14:25:12.709889 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.709950620Z E0223 14:25:12.709931 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.710024622Z E0223 14:25:12.709787 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:12.710197626Z E0223 14:25:12.709814 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.239623506Z E0223 14:25:41.239542 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.240222631Z E0223 14:25:41.240185 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.240691723Z E0223 14:25:41.240655 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.241383601Z E0223 14:25:41.241335 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.241712599Z E0223 14:25:41.241674 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.246040590Z E0223 14:25:41.246003 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.246185024Z E0223 14:25:41.246121 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.258398118Z E0223 14:25:41.258336 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.259197229Z E0223 14:25:41.259126 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.259683661Z E0223 14:25:41.259617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.313329840Z E0223 14:25:41.313236 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.322263090Z E0223 14:25:41.322161 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.351527372Z E0223 14:25:41.351370 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:41.361913289Z E0223 14:25:41.361793 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.653397242Z E0223 14:25:42.653017 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.653397242Z E0223 14:25:42.653356 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.653527275Z E0223 14:25:42.653447 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.653738031Z E0223 14:25:42.653621 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.653787242Z E0223 14:25:42.653753 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.722264573Z E0223 14:25:42.722175 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.722326104Z E0223 14:25:42.722284 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.722342835Z E0223 14:25:42.722311 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.722425157Z E0223 14:25:42.722392 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:25:42.722545470Z E0223 14:25:42.722464 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.242546975Z E0223 14:26:11.242207 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.246537027Z E0223 14:26:11.242751 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.246537027Z E0223 14:26:11.243045 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.246537027Z E0223 14:26:11.243300 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.246537027Z E0223 14:26:11.243607 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.262541769Z E0223 14:26:11.259134 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.262541769Z E0223 14:26:11.259536 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.262541769Z E0223 14:26:11.259756 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.262541769Z E0223 14:26:11.259815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:11.262541769Z E0223 14:26:11.260160 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.665378804Z E0223 14:26:12.665245 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.665447096Z E0223 14:26:12.665366 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.665507878Z E0223 14:26:12.665454 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.665721133Z E0223 14:26:12.665662 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.665899518Z E0223 14:26:12.665834 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.730241912Z E0223 14:26:12.730109 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.730241912Z E0223 14:26:12.730209 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.730311024Z E0223 14:26:12.730109 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.730405037Z E0223 14:26:12.730326 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:12.730405037Z E0223 14:26:12.730113 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.243856396Z E0223 14:26:41.243763 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.245130621Z E0223 14:26:41.244421 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.245130621Z E0223 14:26:41.244565 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.245130621Z E0223 14:26:41.244798 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.245130621Z E0223 14:26:41.245016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.245130621Z E0223 14:26:41.245100 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.245361517Z E0223 14:26:41.245320 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.245500951Z E0223 14:26:41.245455 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.245671655Z E0223 14:26:41.245637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.245954313Z E0223 14:26:41.245894 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.278630140Z E0223 14:26:41.278556 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.287750965Z E0223 14:26:41.287699 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.327433421Z E0223 14:26:41.327349 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.336120715Z E0223 14:26:41.336013 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.408167430Z E0223 14:26:41.408089 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:41.417417618Z E0223 14:26:41.417360 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.670351461Z E0223 14:26:42.670197 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.670351461Z E0223 14:26:42.670240 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.670351461Z E0223 14:26:42.670326 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.670422193Z E0223 14:26:42.670384 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.670690950Z E0223 14:26:42.670598 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.745129039Z E0223 14:26:42.744996 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.745129039Z E0223 14:26:42.745026 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.745204871Z E0223 14:26:42.745127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.745204871Z E0223 14:26:42.745127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" 2026-02-23T14:26:42.745204871Z E0223 14:26:42.745165 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7007794094089835732, SKID=09:4D:90:05:99:C2:91:17:A8:9E:8B:33:F7:A0:74:D9:A8:9D:21:80, AKID=F8:E7:30:B7:05:DA:31:AF:4A:F9:52:9B:C0:7F:60:5F:9C:87:35:41 failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/router-default-7b65dc9fcb-w68qb.json0000640000000000000000000001534115147061704023305 0ustar0000000000000000{"metadata":{"name":"router-default-7b65dc9fcb-w68qb","generateName":"router-default-7b65dc9fcb-","namespace":"openshift-ingress","uid":"06bde94a-3126-4d0f-baba-49dc5fbec61b","resourceVersion":"6759","creationTimestamp":"2026-02-23T14:19:12Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"6b694f4697","pod-template-hash":"7b65dc9fcb"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-7b65dc9fcb","uid":"aa0f9e22-053f-4c12-ae0f-d716243fd926","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-2p6hn","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-2p6hn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["6b694f4697"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:12Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062615147061704037367 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5bd7c86784-mlbx22026-02-23T14:26:59.515071006Z Copying system trust bundle 2026-02-23T14:26:59.595971629Z W0223 14:26:59.595882 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-23T14:26:59.596389350Z I0223 14:26:59.596356 1 observer_polling.go:159] Starting file observer 2026-02-23T14:26:59.596697128Z I0223 14:26:59.596678 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T14:26:59.596768690Z I0223 14:26:59.596743 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:26:59.597294994Z I0223 14:26:59.597244 1 observer_polling.go:159] Starting file observer 2026-02-23T14:26:59.613981153Z I0223 14:26:59.613915 1 builder.go:304] cluster-authentication-operator version - 2026-02-23T14:26:59.614998030Z I0223 14:26:59.614948 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T14:27:00.099668767Z I0223 14:27:00.099633 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-23T14:27:00.102986086Z I0223 14:27:00.102919 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-23T14:27:00.102986086Z I0223 14:27:00.102936 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-23T14:27:00.102986086Z I0223 14:27:00.102954 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-23T14:27:00.102986086Z I0223 14:27:00.102959 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-23T14:27:00.107192459Z I0223 14:27:00.107130 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-23T14:27:00.107209290Z W0223 14:27:00.107191 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:27:00.107216830Z W0223 14:27:00.107206 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-23T14:27:00.107224210Z W0223 14:27:00.107218 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-23T14:27:00.107233130Z W0223 14:27:00.107226 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-23T14:27:00.107242041Z W0223 14:27:00.107234 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-23T14:27:00.107249261Z W0223 14:27:00.107243 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-23T14:27:00.107260931Z I0223 14:27:00.107140 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-23T14:27:00.110084007Z I0223 14:27:00.110052 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-23T14:27:00.110322883Z I0223 14:27:00.110308 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-02-23T14:27:00.110375645Z I0223 14:27:00.110345 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-23T14:27:00.110424996Z I0223 14:27:00.110405 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:27:00.110553679Z I0223 14:27:00.110312 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-23T14:27:00.110606601Z I0223 14:27:00.110578 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-23T14:27:00.110606601Z I0223 14:27:00.110316 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-23T14:27:00.110619391Z I0223 14:27:00.110612 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:27:00.110706424Z I0223 14:27:00.110676 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-23T14:27:00.110706424Z I0223 14:27:00.110693 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-23T14:27:00.110783996Z I0223 14:27:00.110748 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T14:27:00.110851197Z I0223 14:27:00.110822 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771856317\" (2026-02-23 14:18:40 +0000 UTC to 2028-02-23 14:18:41 +0000 UTC (now=2026-02-23 14:27:00.110750755 +0000 UTC))" 2026-02-23T14:27:00.111022502Z I0223 14:27:00.110997 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771856820\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771856820\" (2026-02-23 13:26:59 +0000 UTC to 2027-02-23 13:26:59 +0000 UTC (now=2026-02-23 14:27:00.110975861 +0000 UTC))" 2026-02-23T14:27:00.111034632Z I0223 14:27:00.111027 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-23T14:27:00.111066953Z I0223 14:27:00.111049 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-23T14:27:00.111076343Z I0223 14:27:00.111070 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-23T14:27:00.112686887Z I0223 14:27:00.112656 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-23T14:27:00.112853141Z I0223 14:27:00.112831 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-23T14:27:00.113517799Z I0223 14:27:00.113128 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-02-23T14:27:00.211446669Z I0223 14:27:00.211396 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-23T14:27:00.211534322Z I0223 14:27:00.211521 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-23T14:27:00.211615384Z I0223 14:27:00.211587 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-23T14:27:00.211716267Z I0223 14:27:00.211689 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-23 14:08:36 +0000 UTC to 2026-02-24 14:08:36 +0000 UTC (now=2026-02-23 14:27:00.211648855 +0000 UTC))" 2026-02-23T14:27:00.211957813Z I0223 14:27:00.211937 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771856317\" (2026-02-23 14:18:40 +0000 UTC to 2028-02-23 14:18:41 +0000 UTC (now=2026-02-23 14:27:00.211907902 +0000 UTC))" 2026-02-23T14:27:00.212155848Z I0223 14:27:00.212132 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771856820\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771856820\" (2026-02-23 13:26:59 +0000 UTC to 2027-02-23 13:26:59 +0000 UTC (now=2026-02-23 14:27:00.212109927 +0000 UTC))" 2026-02-23T14:27:00.212316823Z I0223 14:27:00.212298 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 14:01:56 +0000 UTC to 2036-02-21 14:01:56 +0000 UTC (now=2026-02-23 14:27:00.212276572 +0000 UTC))" 2026-02-23T14:27:00.212347983Z I0223 14:27:00.212331 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-23 14:08:38 +0000 UTC to 2026-02-24 14:08:38 +0000 UTC (now=2026-02-23 14:27:00.212313683 +0000 UTC))" 2026-02-23T14:27:00.212376934Z I0223 14:27:00.212360 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-23 14:08:38 +0000 UTC to 2027-02-23 14:08:38 +0000 UTC (now=2026-02-23 14:27:00.212344573 +0000 UTC))" 2026-02-23T14:27:00.212407175Z I0223 14:27:00.212391 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-23 14:08:38 +0000 UTC to 2027-02-23 14:08:38 +0000 UTC (now=2026-02-23 14:27:00.212373954 +0000 UTC))" 2026-02-23T14:27:00.212435616Z I0223 14:27:00.212419 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-23 14:08:36 +0000 UTC to 2036-02-21 14:08:36 +0000 UTC (now=2026-02-23 14:27:00.212403555 +0000 UTC))" 2026-02-23T14:27:00.212464397Z I0223 14:27:00.212448 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-23 14:08:36 +0000 UTC to 2026-02-24 14:08:36 +0000 UTC (now=2026-02-23 14:27:00.212432956 +0000 UTC))" 2026-02-23T14:27:00.212703463Z I0223 14:27:00.212677 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771856317\" (2026-02-23 14:18:40 +0000 UTC to 2028-02-23 14:18:41 +0000 UTC (now=2026-02-23 14:27:00.212655102 +0000 UTC))" 2026-02-23T14:27:00.212911239Z I0223 14:27:00.212893 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771856820\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771856820\" (2026-02-23 13:26:59 +0000 UTC to 2027-02-23 13:26:59 +0000 UTC (now=2026-02-23 14:27:00.212873288 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000000354615147061704037562 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5bd7c86784-mlbx22026-02-23T14:25:59.038572139Z Copying system trust bundle 2026-02-23T14:25:59.115457256Z W0223 14:25:59.115336 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-23T14:25:59.115795614Z I0223 14:25:59.115749 1 observer_polling.go:159] Starting file observer 2026-02-23T14:25:59.116250896Z I0223 14:25:59.116223 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-23T14:25:59.116311818Z I0223 14:25:59.116277 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-23T14:25:59.116798030Z I0223 14:25:59.116773 1 observer_polling.go:159] Starting file observer 2026-02-23T14:26:52.858578334Z I0223 14:26:52.857618 1 builder.go:304] cluster-authentication-operator version - 2026-02-23T14:26:52.862511140Z I0223 14:26:52.858883 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-23T14:26:56.206958840Z I0223 14:26:56.206843 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller. 2026-02-23T14:26:59.116803029Z I0223 14:26:59.116687 1 observer_polling.go:162] Shutting down file observer 2026-02-23T14:26:59.117896298Z I0223 14:26:59.117828 1 observer_polling.go:162] Shutting down file observer 2026-02-23T14:26:59.213546977Z I0223 14:26:59.212544 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-23T14:26:59.213546977Z F0223 14:26:59.212696 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context canceled config/pod/openshift-authentication-operator/authentication-operator-5bd7c86784-mlbx2.json0000640000000000000000000001610315147061704030252 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5bd7c86784-mlbx2","generateName":"authentication-operator-5bd7c86784-","namespace":"openshift-authentication-operator","uid":"e2d00ece-7586-4346-adbb-eaae1aeda69e","resourceVersion":"9156","creationTimestamp":"2026-02-23T14:17:05Z","labels":{"app":"authentication-operator","pod-template-hash":"5bd7c86784"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5bd7c86784","uid":"621ab763-291a-40a6-a46f-0d538921fe01","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-4nr85","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3167ddf67ad2f83e1a3f49ac6c7ee826469ce9ec16db6390f6a94dac24f6a346"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.33_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-4nr85","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c9"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-02-23T14:18:19Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-02-23T14:19:43Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-23T14:18:34Z","finishedAt":"2026-02-23T14:19:40Z","containerID":"cri-o://6fdaded4c1d5d4706ada0063d02a22ac0f3bed1016ec71609468c9f080c894da"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","containerID":"cri-o://54011ffa8f000620849835983f9e2c00740786e321e8cd4e4de797c7d208b465","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-4nr85","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000002300115147061704020635 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:13:28Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:13:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-5c75f78c8b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:13:41Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c75f78c8b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:17:02Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:17:03Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c75f78c8b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:17:05Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:17:05Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-5c75f78c8b-cj2l7","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:18:19Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-cj2l7 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:18:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:18:43Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:05Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:06Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:06Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:06Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" in 8.586s (8.586s including waiting). Image size: 862501144 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:15Z","reason":"LeaderElection","message":"package-server-manager-5c75f78c8b-cj2l7_fb5a8178-c357-40da-9fca-288eaa4f0e09 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5499d7f7bb to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:30Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.51/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:30Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-5499d7f7bb-t45zz to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-596f79dd6f to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:30Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f-mhzxn to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:30Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-596f79dd6f-mhzxn","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:30Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5499d7f7bb-t45zz","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:30Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:31Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:31Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:31Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:31Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:31Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:32Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-65c9585877-m66zh","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:32Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/packageserver-65c9585877-m66zh to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:32Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:32Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-65c9585877 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:32Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:33Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:43Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.62/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:44Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-23T14:19:44Z","reason":"Created","message":"Created container: packageserver","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001771115147061704015450 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-7cd76464f7 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:48Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-7cd76464f7-bfxtj to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:48Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-7cd76464f7-bfxtj","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : configmap \"etcd-serving-ca\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:53Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-7cd76464f7-bfxtj","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:53Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-7cd76464f7 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-746d649f6b to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:53Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-746d649f6b-54g2n","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:54Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:57Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-746d649f6b-54g2n to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:58Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:58Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-666b887977-f7h55","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-666b887977 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:58Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-746d649f6b to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.32/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:18:58Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-746d649f6b-54g2n","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:05Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:05Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\" in 7.419s (7.419s including waiting). Image size: 589275174 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:05Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:05Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:07Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-666b887977-f7h55 to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:11Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:12Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:12Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:12Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:16Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:16Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:18Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-23T14:19:18Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000010300715147061704017273 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:13:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-8586dccc9b to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:13:36Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-8586dccc9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:17:03Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-8586dccc9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:17:05Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:17:05Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-8586dccc9b-tvnmq","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:19Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-tvnmq to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\" in 5.835s (5.835s including waiting). Image size: 512172666 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"LeaderElection","message":"openshift-apiserver-operator-8586dccc9b-tvnmq_ae65ac6f-84ea-4bc9-86fd-97a2855374ee became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:47Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:55Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:58Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:18:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 2, desired generation is 3.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 2, desired generation is 3.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.33\"}] to [{\"operator\" \"4.18.33\"} {\"openshift-apiserver\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-23T14:19:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000010021715147061704020175 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:13:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-77cd4d9559 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:13:36Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-77cd4d9559-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:17:03Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-77cd4d9559-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:17:05Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:17:05Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-77cd4d9559-qvq8x","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:19Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-qvq8x to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" in 5.748s (5.748s including waiting). Image size: 506291135 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-77cd4d9559-qvq8x_51639914-3e11-4020-bb11-4e61e7cc044a became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:43Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:43Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:49Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:54Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:58Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:18:59Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:00Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:05Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:06Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:12Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:13Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:14Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:19Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:19Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:19Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:27Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:28Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:28Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-23T14:19:32Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000020443015147061704020221 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:13:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-5d87bf58c to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:13:41Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-5d87bf58c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:17:04Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-5d87bf58c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:17:06Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:17:06Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-5d87bf58c-nq2tz","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:19Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-nq2tz to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:21Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:21Z","reason":"LeaderElection","message":"kube-apiserver-operator-5d87bf58c-nq2tz_7fbe7b8e-737b-45fc-ab16-6138abaef657 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:21Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:21Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:21Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:21Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:21Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to False (\"NodeControllerDegraded: All master nodes are ready\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"),EvaluationConditionsDetected set to False (\"All is well\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:26Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:26Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:26Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:26Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:26Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:27Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:27Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:27Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:27Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:30Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:30Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:30Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:30Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:31Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:31Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:31Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:31Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:32Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:32Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:33Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:33Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:33Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:33Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:43Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:43Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:18:59Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:05Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:06Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:06Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:08Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:09Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:10Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:10Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:13Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-23T14:19:16Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000000136215147061704014362 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T14:19:15Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T14:19:16Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-23T14:19:16Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000007412715147061704016224 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:13:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-545bf96f4d to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:13:37Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-545bf96f4d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:17:04Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-545bf96f4d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:17:06Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:17:06Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-545bf96f4d-fpwtm","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:19Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-545bf96f4d-fpwtm to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.16/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:31Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:31Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" in 549ms (549ms including waiting). Image size: 518279996 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEnvVarControllerDegraded: empty NodeStatuses, can't generate environment for getEscapedIPAddress\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEnvVarControllerDegraded: empty NodeStatuses, can't generate environment for getEscapedIPAddress\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"LeaderElection","message":"etcd-operator-545bf96f4d-fpwtm_c7fbd317-3dcf-4941-9346-b79e1cd4fe16 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEnvVarControllerDegraded: empty NodeStatuses, can't generate environment for getEscapedIPAddress\",Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:46Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:47Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:47Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:48Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:48Z","reason":"DefragControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:49Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:53Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:55Z","reason":"ScriptControllerErrorUpdatingStatus","message":"client rate limiter Wait returned an error: context canceled","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:55Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Put \"https://172.30.0.1:443/apis/operator.openshift.io/v1/etcds/cluster/status\": context canceled","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEnvVarControllerDegraded: no supported cipherSuites not found in observedConfig\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nEnvVarControllerDegraded: no supported cipherSuites not found in observedConfig\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nEnvVarControllerDegraded: no supported cipherSuites not found in observedConfig\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nEnvVarControllerDegraded: no supported cipherSuites not found in observedConfig\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersDegraded: No unhealthy members found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"LeaderElection","message":"etcd-operator-545bf96f4d-fpwtm_6666d14d-6590-471f-94fd-bc6afbcc5e0d became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nEnvVarControllerDegraded: no supported cipherSuites not found in observedConfig\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersDegraded: No unhealthy members found\" to \"EnvVarControllerDegraded: no supported cipherSuites not found in observedConfig\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersDegraded: No unhealthy members found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EnvVarControllerDegraded: no supported cipherSuites not found in observedConfig\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersDegraded: No unhealthy members found\" to \"EnvVarControllerDegraded: no supported cipherSuites not found in observedConfig\\nInstallerControllerDegraded: missing required resources: [configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0]\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersDegraded: No unhealthy members found\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:58Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0\" to \"NodeInstallerProgressing: 1 node is at revision 0\\nEtcdMembersProgressing: No unstarted etcd members found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:59Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:59Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:18:59Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:01Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-endpoints -n openshift-etcd:\ncause by changes in data.91eb892c5ee87610,data.MTkyLjE2OC4zMi4xMA","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:02Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:05Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-23T14:19:07Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"}]}events/openshift-machine-api.json0000640000000000000000000002114515147061704015617 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:19Z","reason":"ScalingReplicaSet","message":"Scaled up replica set control-plane-machine-set-operator-686847ff5f to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:19Z","reason":"SuccessfulCreate","message":"Created pod: control-plane-machine-set-operator-686847ff5f-9q266","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:19Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-api/control-plane-machine-set-operator-686847ff5f-9q266 to master-0","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac\" in 2.412s (2.412s including waiting). Image size: 470575802 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:23Z","reason":"Created","message":"Created container: control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:23Z","reason":"LeaderElection","message":"control-plane-machine-set-operator-686847ff5f-9q266_faf29878-cb5d-4259-bdcf-4a75b048fdb6 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:23Z","reason":"Started","message":"Started container control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:28Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-api/cluster-autoscaler-operator-86b8dc6d6-2kvfp to master-0","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:28Z","reason":"SuccessfulCreate","message":"Created pod: cluster-autoscaler-operator-86b8dc6d6-2kvfp","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:28Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-autoscaler-operator-86b8dc6d6 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:28Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-4frj6 to master-0","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:28Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-baremetal-operator-d6bb9bb76 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:28Z","reason":"SuccessfulCreate","message":"Created pod: cluster-baremetal-operator-d6bb9bb76-4frj6","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.50/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:30Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:30Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:31Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-api/machine-api-operator-5c7cf458b4-bb7zl to master-0","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:31Z","reason":"SuccessfulCreate","message":"Created pod: machine-api-operator-5c7cf458b4-bb7zl","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:31Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-api-operator-5c7cf458b4 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:42Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:42Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6\" in 12.534s (12.534s including waiting). Image size: 470717179 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:42Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6\" in 12.346s (12.346s including waiting). Image size: 456273550 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"LeaderElection","message":"cluster-autoscaler-operator-86b8dc6d6-2kvfp_b5fd9df6-10e6-4d4e-8866-974c577a3f53 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Started","message":"Started container baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Created","message":"Created container: baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Started","message":"Started container cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Created","message":"Created container: cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:572b0ca6e993beea2ee9346197665e56a2e4999fbb6958c747c48a35bf72ee34\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Started","message":"Started container cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Created","message":"Created container: cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-23T14:19:44Z","reason":"LeaderElection","message":"cluster-baremetal-operator-d6bb9bb76-4frj6_1b90257d-3dd0-47a6-b08d-ea13e1a26018 became leader","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443715147061704016567 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:04Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-67f44b4d6d-7lpn4 to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:04Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-67f44b4d6d-7lpn4","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:04Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-67f44b4d6d to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:06Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:06Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:11Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\" in 4.725s (4.725s including waiting). Image size: 505244089 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:11Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:12Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-23T14:19:15Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015147061704015110 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-23T14:19:12Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-23T14:19:12Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7b65dc9fcb-w68qb","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-23T14:19:12Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7b65dc9fcb to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000022674415147061704020330 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:13:28Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5bd7c86784 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:13:38Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5bd7c86784-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:17:03Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5bd7c86784-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:17:05Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:17:05Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5bd7c86784-mlbx2","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:19Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-5bd7c86784-mlbx2 to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\" in 5.664s (5.664s including waiting). Image size: 513119434 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:35Z","reason":"LeaderElection","message":"authentication-operator-5bd7c86784-mlbx2_94624996-7dea-4839-b878-8afa150a9687 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:36Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:38Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:40Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-xl7n6\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-xl7n6\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:42Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:45Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:46Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:47Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:49Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:51Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:54Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:54Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:54Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:55Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:56Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:18:57Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:00Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:00Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:00Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:17Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:17Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:17Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:21Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:22Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:22Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:22Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.33\"}] to [{\"operator\" \"4.18.33\"} {\"oauth-apiserver\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.217.209:443/healthz\\\": dial tcp 172.30.217.209:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:26Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:43Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-23T14:19:43Z","reason":"LeaderElection","message":"authentication-operator-5bd7c86784-mlbx2_ac0cfdbe-5d98-49f0-9371-894ae159c724 became leader","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015147061704016275 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-23T14:19:13Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-23T14:19:13Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003267215147061621014615 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":311,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-os-puller","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/node/logs/master-0.log0000640000000000000000000000763215147061000014533 0ustar0000000000000000Feb 23 14:19:07.683681 master-0 kubenswrapper[7728]: E0223 14:19:07.683610 7728 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="7319dd65-3b07-4120-9a7b-60da5d0ed066" containerName="fix-audit-permissions" Feb 23 14:19:11.674083 master-0 kubenswrapper[7728]: I0223 14:19:11.673743 7728 patch_prober.go:28] interesting pod/marketplace-operator-6f5488b997-7b5sp container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.15:8080/healthz\": dial tcp 10.128.0.15:8080: connect: connection refused" start-of-body= Feb 23 14:19:11.674083 master-0 kubenswrapper[7728]: I0223 14:19:11.673795 7728 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-6f5488b997-7b5sp" podUID="585f74db-4593-426b-b0c7-ec8f64810549" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.15:8080/healthz\": dial tcp 10.128.0.15:8080: connect: connection refused" Feb 23 14:19:12.368724 master-0 kubenswrapper[7728]: E0223 14:19:12.368264 7728 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="722d4323-f61f-43f0-958a-38b117880306" containerName="route-controller-manager" Feb 23 14:19:12.368724 master-0 kubenswrapper[7728]: E0223 14:19:12.368298 7728 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="65845117-85ab-4133-99ed-6dcd6e736e09" containerName="controller-manager" Feb 23 14:19:17.849143 master-0 kubenswrapper[7728]: E0223 14:19:17.849090 7728 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"1428da8f7e46531b25d14355faa50d250078cad565c334445a3cf45616e87b7a\": container with ID starting with 1428da8f7e46531b25d14355faa50d250078cad565c334445a3cf45616e87b7a not found: ID does not exist" containerID="1428da8f7e46531b25d14355faa50d250078cad565c334445a3cf45616e87b7a" Feb 23 14:19:19.170985 master-0 kubenswrapper[7728]: E0223 14:19:19.170317 7728 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="ab99fbb6-d945-4bf7-a85c-239f83137a4d" containerName="installer" Feb 23 14:19:28.669556 master-0 kubenswrapper[7728]: E0223 14:19:28.668741 7728 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5483bcd0-a9c7-4fdf-9c55-03f85a06b303" containerName="installer" Feb 23 14:19:31.654532 master-0 kubenswrapper[7728]: E0223 14:19:31.654503 7728 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5a5f3286-9ec6-4867-aaf7-3c31b1f6c126" containerName="installer" Feb 23 14:19:31.993063 master-0 kubenswrapper[7728]: E0223 14:19:31.989201 7728 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f5ecbbc97f8363e1b32d81fb3d21757d9b3607a089392deba2dfe5ae2374b9b0\": container with ID starting with f5ecbbc97f8363e1b32d81fb3d21757d9b3607a089392deba2dfe5ae2374b9b0 not found: ID does not exist" containerID="f5ecbbc97f8363e1b32d81fb3d21757d9b3607a089392deba2dfe5ae2374b9b0" Feb 23 14:19:32.124095 master-0 kubenswrapper[7728]: E0223 14:19:32.124051 7728 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"ea6ce47f9f9923c200af89a0427525b1c65bce88c6467d37861598640e2b236f\": container with ID starting with ea6ce47f9f9923c200af89a0427525b1c65bce88c6467d37861598640e2b236f not found: ID does not exist" containerID="ea6ce47f9f9923c200af89a0427525b1c65bce88c6467d37861598640e2b236f" Feb 23 14:19:32.636757 master-0 kubenswrapper[7728]: E0223 14:19:32.636409 7728 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="9694f604-5dcf-4aec-a54f-67b4d8dc8809" containerName="route-controller-manager" Feb 23 14:19:32.636757 master-0 kubenswrapper[7728]: E0223 14:19:32.636442 7728 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="b2af015a-7f5f-4702-9f06-8159a040dabe" containerName="controller-manager"aggregated/ingress_controllers_certs.json0000640000000000000000000000045715147061000017525 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-23T14:19:11Z","not_after":"2028-02-23T14:19:12Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-23T14:19:11Z","not_after":"2028-02-23T14:19:12Z","controllers":[]}]config/clusteroperator/storage.json0000640000000000000000000000131215147061000016270 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"d9008400-1e02-4a49-9b85-0561aa4a9250","resourceVersion":"803","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315147061000016650 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"a26610dc-ecd6-48da-beab-0cf204ab0cfb","resourceVersion":"4334","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:18:42Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:18:38Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000252415147061000024652 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"e9db5331-349b-4af6-b623-28cc045935b1","resourceVersion":"8811","generation":1,"creationTimestamp":"2026-02-23T14:13:11Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:19:31Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T14:19:31Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:19:31Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:31Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255415147061000023445 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"9aec7739-1984-40dd-a73b-d3ae4e9bcd8a","resourceVersion":"8851","generation":1,"creationTimestamp":"2026-02-23T14:13:11Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:19:31Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:19:31Z","message":"Deployed 4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:31Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:31Z"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115147061000022032 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"71cb88d6-7290-4b58-866a-130c56de2923","resourceVersion":"8828","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:31Z","message":"Deployed 4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:31Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:19:31Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:31Z"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315147061000020274 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"e98bc851-6b89-4440-b2cd-62b8ef8629a3","resourceVersion":"825","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215147061000022430 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"d7c35b40-88aa-472c-a1d4-5bfea6cbd971","resourceVersion":"8962","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:50Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:18:55Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4."},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:10Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:55Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:50Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215147061000020626 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"ac5a9612-5a4c-4f65-b9c2-364ad7fddd47","resourceVersion":"8302","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:23Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T14:18:37Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"openshift-apiserver","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415147061000015417 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"cbf593f9-3771-4da3-9df0-bfbcaf267687","resourceVersion":"7556","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:54Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:21Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:21Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:53Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:53Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115147061000017056 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"3c9c29f6-8556-45f7-be5a-fca63c4c162a","resourceVersion":"5305","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:18:51Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.33\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:18:52Z","reason":"AsExpected","message":"Cluster version is \"4.18.33\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:50Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.33"},{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315147061000016327 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"470bec4e-692c-433b-8a8d-129303810697","resourceVersion":"6799","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-23T14:17:24Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:17:12Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:17:12Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:13Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:18:34Z"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715147061000017022 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"c7635c96-1756-47a4-a69c-9a0ca1def82d","resourceVersion":"6615","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-02-23T14:19:11Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-02-23T14:19:11Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:19:11Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:11Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315147061000017117 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"40b1140d-5b9c-4993-b1fb-454da36a92e1","resourceVersion":"6681","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:12Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.33"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:12Z","reason":"OperatorAvailable","message":"Available release version: 4.18.33"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:12Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:19:12Z","reason":"OperatorAvailable","message":"Available release version: 4.18.33"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015147061000017471 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"f8f8eedc-65b0-47af-8ead-39b85dd56491","resourceVersion":"744","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215147061000020071 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"d3c87df6-c90f-4675-b31a-a135cb14746d","resourceVersion":"8250","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:25Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.33"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:19:25Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:25Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:25Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000263415147061000017007 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"c07b493c-156a-4a26-be3b-27866de0aa3d","resourceVersion":"724","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","name":""},{"group":"machine.openshift.io","resource":"machinesets","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddresses","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddressclaims","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315147061000022527 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"28f945c0-0518-4ab6-8e3b-7b9f4a3c5a4a","resourceVersion":"4264","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:18:41Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:18:41Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:35Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615147061000017537 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"880e7aac-1473-4156-ba53-ac3d70468bd6","resourceVersion":"8653","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:18:51Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715147061000021360 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"54f721a1-c48b-470c-802f-d6b44072ffcd","resourceVersion":"8560","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:37Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:19:11Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T14:18:39Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:37Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715147061000017565 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"2bf4c825-ac69-444f-a2cd-4e3e03785ec0","resourceVersion":"6812","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:21Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:19:13Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T14:18:23Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:21Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-23T14:18:21Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415147061000016457 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"c50140b6-0452-48a5-8bce-e0a93444a507","resourceVersion":"808","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715147061000016315 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"52a03d80-e289-4bc8-b793-2c68685334ec","resourceVersion":"6803","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:13Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:19:12Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:19:13Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:12Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-23T14:19:12Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715147061000017562 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"0005b411-6c21-4176-b66c-aceb68b402c9","resourceVersion":"816","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000365415147061000015556 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"f0710886-63af-4c75-a8b8-e67403bbccb0","resourceVersion":"6473","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:45Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:19:10Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T14:18:45Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:45Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:45Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515147061000015424 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"f26c3f04-caaf-4cf5-ba5b-805c8c8e7822","resourceVersion":"8261","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:26Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:18:51Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:19:26Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:50Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715147061000021426 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"5d17237a-0053-4009-be47-05c773cf7980","resourceVersion":"4998","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:44Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:18:50Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:18:50Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:44Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:44Z","reason":"NoData"}],"versions":[{"name":"csi-snapshot-controller","version":"4.18.33"},{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515147061000021605 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"6863c8ef-e138-45f6-a46b-5a26bcef7634","resourceVersion":"8074","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:23Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:23Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:19:23Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:23Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215147061000016266 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"1fd2d45c-81c0-4545-bf10-2f9cac555395","resourceVersion":"711","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000154215147061000017727 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"f2971aab-a75c-4986-b83d-eb623c7d4d26","resourceVersion":"715","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000260315147061000020451 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"eb1aa9bb-9355-467b-aae6-20e504913890","resourceVersion":"9186","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:43Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:43Z"},{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-23T14:19:43Z","reason":"MissingDependency","message":"machine-api not ready"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:43Z"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000000346515147061000020055 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"ac9eb8f3-4faa-48ae-bec9-792e901d83d3","resourceVersion":"798","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"pod-identity-webhook"},{"group":"apps","resource":"deployments","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","name":""},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"","resource":"serviceaccounts","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"","resource":"services","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"pod-identity-webhook"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715147061000021536 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"0ccb3034-3d3c-45f2-b9ff-fecc5a3d3add","resourceVersion":"714","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015147061000016566 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"8a2a8fe5-69fa-4641-b334-25070d1b199e","resourceVersion":"9185","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:43Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:19:43Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-23T14:19:43Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:19:43Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-23T14:19:43Z"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000773615147061000017663 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"efd22571-9ad2-4c44-8b0b-fbf0a88df3bf","resourceVersion":"8271","generation":1,"creationTimestamp":"2026-02-23T14:13:10Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"AsExpected","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.217.209:443/healthz\": dial tcp 172.30.217.209:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-23T14:19:26Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.217.209:443/healthz\": dial tcp 172.30.217.209:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-23T14:18:36Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"oauth-apiserver","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}aggregated/unused_machine_configs_count.json0000640000000000000000000000004115147061000020121 0ustar0000000000000000{"unused_machineconfigs_count":9}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515147061000023207 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115147061000025417 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715147061000025126 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715147061000025117 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315147061000022237 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515147061000026673 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115147061000023376 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115147061000023172 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115147061000025462 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/machineconfigpools/worker.json0000640000000000000000000000106515147061000016554 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-23T14:19:32Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"8923","uid":"5802ea1e-920c-4540-a39d-d0ec6b6bd84f"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117215147061000016535 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-23T14:19:32Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"8918","uid":"5c836cae-1b1e-4570-9ffe-6693b8881d42"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/pod/openshift-cluster-version/cluster-version-operator-57476485-m58rm.json0000640000000000000000000001341015147061000026212 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-57476485-m58rm","generateName":"cluster-version-operator-57476485-","namespace":"openshift-cluster-version","uid":"b9774f8c-0f29-46d8-be77-81bcf74d5994","resourceVersion":"6391","creationTimestamp":"2026-02-23T14:19:06Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"57476485"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-57476485","uid":"dd70fa10-aaed-4b79-8397-77ab366f87ce","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:19:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T14:19:06Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-23T14:19:06Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","containerID":"cri-o://94bfdbcfdcf4914977da334b3fd2fe80966ec6c36be33d3628e4eada6361765f","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415147061000011014 0ustar0000000000000000a559641c-5a83-49b4-b92b-5e8536dcf122config/version.json0000640000000000000000000000723515147061000013066 0ustar0000000000000000{"metadata":{"name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","resourceVersion":"9103","generation":2,"creationTimestamp":"2026-02-23T14:12:45Z"},"spec":{"clusterID":"a559641c-5a83-49b4-b92b-5e8536dcf122","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.33","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","url":"https://access.redhat.com/errata/RHSA-2026:2078","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-23T14:13:10Z","completionTime":null,"version":"4.18.33","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","verified":false}],"observedGeneration":2,"versionHash":"aMIRe2pH-Eo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-23T14:13:10Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-23T14:13:10Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-23T14:13:10Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-23T14:13:10Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-23T14:13:10Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-02-23T14:19:40Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cloud-controller-manager, cloud-credential, cluster-autoscaler, config-operator, control-plane-machine-set, dns, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, olm, openshift-apiserver, openshift-samples, operator-lifecycle-manager, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 906): resource may have been deleted\n* Could not update oauthclient \"console\" (550 of 906): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (823 of 906): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (827 of 906): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-23T14:13:10Z","reason":"MultipleErrors","message":"Unable to apply 4.18.33: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615147061000027470 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"0f9c0d2d-3188-4d61-beb5-011dfd31380a","resourceVersion":"5874","generation":2,"creationTimestamp":"2026-02-23T14:18:59Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/running_containers.json0000640000000000000000000000720715147061000015305 0ustar0000000000000000{"images":{"0":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","1":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","10":"sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","11":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","12":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","13":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","14":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","15":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","16":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","17":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","18":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","19":"sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0","2":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","20":"sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656","21":"sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de","22":"sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","23":"sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa","24":"sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","25":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","26":"sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","27":"sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","28":"sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","29":"sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","3":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","30":"sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c","31":"sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec","32":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","33":"sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","34":"sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","35":"sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","36":"sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3","37":"sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd","38":"sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e","39":"sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e","4":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","40":"sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568","41":"sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","42":"sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf","5":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","6":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","7":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","8":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","9":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2"},"containers":{"2026-02":{"0":13,"1":10,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":1,"2":4,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":4,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":3,"40":1,"41":1,"42":1,"5":2,"6":2,"7":2,"8":2,"9":2}}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513615147061000026251 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"d858e535-3840-490b-864a-c70e450e719b","resourceVersion":"3743","creationTimestamp":"2026-02-23T14:17:06Z","annotations":{"kubernetes.io/config.hash":"c997c8e9d3be51d454d8e61e376bef08","kubernetes.io/config.mirror":"c997c8e9d3be51d454d8e61e376bef08","kubernetes.io/config.seen":"2026-02-23T14:16:30.874355077Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"740d3eac-e552-4d41-9ef9-4425e047b84e","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:27Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:27Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-23T14:18:27Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-23T14:18:27Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-23T14:16:34Z","finishedAt":"2026-02-23T14:16:34Z","containerID":"cri-o://02553ea2f34fd5b9d9104437dd7120800883c473073a6a74895604093906e009"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://02553ea2f34fd5b9d9104437dd7120800883c473073a6a74895604093906e009","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-23T14:17:17Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0223 14:16:51.348318 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0223 14:16:51.348523 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0223 14:16:51.350184 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-02-23T14:16:51Z","finishedAt":"2026-02-23T14:16:51Z","containerID":"cri-o://6ac0b900bdb2d552799e0b2929f88eaa7518eb0c998cb215c17a947032781e19"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://404214ba54b8b128195146c77065f2702359c7ee02579e2cb25064ddce3c7dcc","started":true}],"qosClass":"Burstable"}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615147061000025472 0ustar0000000000000000{"metadata":{"name":"edit","uid":"29e93d03-5c66-46df-a193-30844c6f1dea","resourceVersion":"8575","creationTimestamp":"2026-02-23T14:11:30Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315147061000025633 0ustar0000000000000000{"metadata":{"name":"admin","uid":"b2a4e16c-53ce-41ab-b8fa-7e52dcc59d65","resourceVersion":"8576","creationTimestamp":"2026-02-23T14:11:30Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/oauth.json0000640000000000000000000000114415147061000012512 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"80d2552e-a2f4-4dfe-a87f-34268cfe4629","resourceVersion":"1713","generation":1,"creationTimestamp":"2026-02-23T14:13:30Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315147061000023434 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"83e9ea35-2637-4be3-8fa4-5fafbb1f5d1f","resourceVersion":"4545","generation":1,"creationTimestamp":"2026-02-23T14:18:44Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-23T14:18:44Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-23T14:18:44Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-23T14:18:44Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015147061000022037 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"68943bc3-9115-42b0-bc8e-c3022b09fbd7","resourceVersion":"4516","generation":1,"creationTimestamp":"2026-02-23T14:18:44Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-23T14:18:44Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-23T14:18:44Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-23T14:18:44Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115147061000025266 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"6450fa43-82ab-478a-b3e9-308d68165bc6","resourceVersion":"4282","generation":2,"creationTimestamp":"2026-02-23T14:13:38Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515147061000026725 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"a37f5e20-9721-439e-ac2b-96626fdc9162","resourceVersion":"6790","generation":1,"creationTimestamp":"2026-02-23T14:19:12Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"3214b791-5395-40fe-a9d3-5b57e0371db3","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715147061000024013 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"a7ed1c6e-0c57-4e75-b216-611d1b112589","resourceVersion":"4280","generation":2,"creationTimestamp":"2026-02-23T14:17:26Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"3214b791-5395-40fe-a9d3-5b57e0371db3","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537215147061000030625 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"434042e6-6559-47e0-b981-c128a8842d48","resourceVersion":"9118","generation":2,"creationTimestamp":"2026-02-23T14:19:42Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115147061000032076 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"b33e3f55-ef10-4f37-8204-8715710ed5e0","resourceVersion":"9200","generation":2,"creationTimestamp":"2026-02-23T14:19:43Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102615147061000024763 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"538435c0-38e4-4d09-b41c-58b97f16ee54","resourceVersion":"9182","generation":2,"creationTimestamp":"2026-02-23T14:19:43Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/proxy.json0000640000000000000000000000031315147061000012550 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5405b1a9-d465-48bf-941d-3757e8edd2c6","resourceVersion":"563","generation":1,"creationTimestamp":"2026-02-23T14:12:41Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/ingress.json0000640000000000000000000000043615147061000013047 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"96d3af37-bfb2-4be2-b6e0-0496800d0503","resourceVersion":"559","generation":1,"creationTimestamp":"2026-02-23T14:12:40Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215147061000020166 0ustar0000000000000000[]config/apiserver.json0000640000000000000000000000121615147061000013372 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6cf1e142-0902-4993-a0ae-6cf01f6a2efa","resourceVersion":"969","generation":1,"creationTimestamp":"2026-02-23T14:13:13Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/authentication.json0000640000000000000000000000116515147061000014414 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"1d3b29cc-fa77-4f57-a8cd-b7806316f010","resourceVersion":"1187","generation":1,"creationTimestamp":"2026-02-23T14:13:19Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/node/master-0.json0000640000000000000000000000551415147061000013754 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"740d3eac-e552-4d41-9ef9-4425e047b84e","resourceVersion":"9100","creationTimestamp":"2026-02-23T14:17:04Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-23T14:19:39Z","lastTransitionTime":"2026-02-23T14:17:04Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-23T14:19:39Z","lastTransitionTime":"2026-02-23T14:17:04Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-23T14:19:39Z","lastTransitionTime":"2026-02-23T14:17:04Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-23T14:19:39Z","lastTransitionTime":"2026-02-23T14:18:19Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.109.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602022246-0","containerRuntimeVersion":"cri-o://1.31.13-6.rhaos4.18.git7ed6156.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"runc","features":{"recursiveReadOnlyMounts":true}},{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}}]}}config/infrastructure.json0000640000000000000000000000106515147061000014454 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"78e3afaf-0fe1-43fc-8cdf-ec65eb9a56f1","resourceVersion":"545","generation":1,"creationTimestamp":"2026-02-23T14:12:39Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/network.json0000640000000000000000000000117015147061000013062 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"138e706a-2a05-43df-a9c3-43113d9eec6e","resourceVersion":"3073","generation":2,"creationTimestamp":"2026-02-23T14:12:41Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/featuregate.json0000640000000000000000000000613615147061000013674 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d4d5117d-6082-4d6b-852c-67dbce2c648c","resourceVersion":"651","generation":1,"creationTimestamp":"2026-02-23T14:13:02Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.33","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000174015147061000025106 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"b4e3d689-2cdb-41ca-a51f-85cff54a1fc2","resourceVersion":"8960","generation":1,"creationTimestamp":"2026-02-23T14:13:28Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2026-02-23T14:13:28Z","reason":"InsufficientPods","message":""}]}}config/schedulers/cluster.json0000640000000000000000000000052415147061000015215 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"2788aa8d-4d5f-4a5e-bca3-d39cf04d939e","resourceVersion":"569","generation":1,"creationTimestamp":"2026-02-23T14:12:43Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/image.json0000640000000000000000000000111715147061000012454 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d560e1be-d11b-4072-a89a-baa873669e1f","resourceVersion":"1573","generation":1,"creationTimestamp":"2026-02-23T14:13:27Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"d950ee56-f5b1-4b64-94c9-47eabb1f0c09"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}