insights-operator/gathers.json0000640000000000000000000003732015144476214015266 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/active_alerts","duration_in_ms":57,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":51,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":54,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":88,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":45,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":48,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":47,"records_count":5,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":44,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":131,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":6142,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":26,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5135,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":75,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":47,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":44,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":37,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":42,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":2463,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":170,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":14,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":46,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":1695,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":8019,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":21515,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":44,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":91,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":7927,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":25,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":47,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":25,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":5739,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":56,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":227,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":54,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":15,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":23,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":47,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":23839,"records_count":146,"errors":["function \"support_secret\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"silenced_alerts\" failed with an error","function \"active_alerts\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-v7lmz.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-htjgz.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":5,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":38,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":83,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":108,"records_count":10,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":20906,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":23831,"records_count":58,"errors":["the record with the same name \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-v7lmz.json\" was already recorded and had the fingerprint \"d7a85579a386e6a74a0fd90797ae70bf99be75ad40852f3642ccedb1a03df8d8\", overwriting with the record having fingerprint \"d7a85579a386e6a74a0fd90797ae70bf99be75ad40852f3642ccedb1a03df8d8\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-htjgz.json\" was already recorded and had the fingerprint \"ff46e02c453cac5871e9d1bf9c2701b180643d2400dd98c926d04b7c05ac431b\", overwriting with the record having fingerprint \"ff46e02c453cac5871e9d1bf9c2701b180643d2400dd98c926d04b7c05ac431b\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_previous.log\" was already recorded and had the fingerprint \"520725ca71bea31ec781f1a88d0fcd0eec22f4e202f6e0423522a267b77612ca\", overwriting with the record having fingerprint \"520725ca71bea31ec781f1a88d0fcd0eec22f4e202f6e0423522a267b77612ca\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_current.log\" was already recorded and had the fingerprint \"b0f1ab3a47a1e3761bd50b4598347ca33fe46db041e037bb744e922c46bbbaa1\", overwriting with the record having fingerprint \"b0f1ab3a47a1e3761bd50b4598347ca33fe46db041e037bb744e922c46bbbaa1\""],"warnings":["warning: the record with the same fingerprint \"d7a85579a386e6a74a0fd90797ae70bf99be75ad40852f3642ccedb1a03df8d8\" was already recorded at path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-v7lmz.json\", recording another one with a different path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-v7lmz.json\"","warning: the record with the same fingerprint \"ff46e02c453cac5871e9d1bf9c2701b180643d2400dd98c926d04b7c05ac431b\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-htjgz.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-htjgz.json\"","warning: the record with the same fingerprint \"520725ca71bea31ec781f1a88d0fcd0eec22f4e202f6e0423522a267b77612ca\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"b0f1ab3a47a1e3761bd50b4598347ca33fe46db041e037bb744e922c46bbbaa1\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_current.log\""],"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":16,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5134,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":55,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":9,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":10099,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":43.01,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515144476214017772 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515144476214021074 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005051315144476214014251 0ustar0000000000000000{"pods":73,"imageCount":61,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:1e9c22ee3a299d04b38dd66f73f7c33a2a8a1917885eebea853656e5476d3b7f","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:382900636cc6bc44aef54886ff17e1948ee0729f04aa833c8319c40657b4fce7","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:28df36269fc553eb1adba5566d6dfc258a1a74063c4cfe8b5bdd3f202591cf56","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:3e2f869b1c4f98a628b2e54c1516a0d0c09c760c91e0e1a940cb76149217661b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"ignoredCount":1,"shapes":[]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":2,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","firstArg":"aZFPdeh8u0QY"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000004347315144476207033540 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-87777c9b7-fxzh62026-02-16T02:09:50.727106933Z time="2026-02-16T02:09:50Z" level=info msg="Using in-cluster kube client config" 2026-02-16T02:09:50.735364488Z time="2026-02-16T02:09:50Z" level=info msg="Defaulting Interval to '12h0m0s'" 2026-02-16T02:09:50.781274608Z I0216 02:09:50.781082 1 handler.go:286] Adding GroupVersion packages.operators.coreos.com v1 to ResourceManager 2026-02-16T02:09:50.782456037Z time="2026-02-16T02:09:50Z" level=info msg="connection established. cluster-version: v1.31.14" 2026-02-16T02:09:50.782477398Z time="2026-02-16T02:09:50Z" level=info msg="operator ready" 2026-02-16T02:09:50.782487668Z time="2026-02-16T02:09:50Z" level=info msg="starting informers..." 2026-02-16T02:09:50.782497878Z time="2026-02-16T02:09:50Z" level=info msg="informers started" 2026-02-16T02:09:50.782497878Z time="2026-02-16T02:09:50Z" level=info msg="waiting for caches to sync..." 2026-02-16T02:09:50.883489795Z time="2026-02-16T02:09:50Z" level=info msg="starting workers..." 2026-02-16T02:09:50.884901030Z time="2026-02-16T02:09:50Z" level=info msg="connecting to source" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-02-16T02:09:50.885129035Z time="2026-02-16T02:09:50Z" level=info msg="connecting to source" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-02-16T02:09:50.885791142Z time="2026-02-16T02:09:50Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-02-16T02:09:50.894346944Z time="2026-02-16T02:09:50Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-02-16T02:09:50.903265806Z W0216 02:09:50.903219 1 logging.go:55] [core] [Channel #5 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.220.224:50051: connect: connection refused" 2026-02-16T02:09:50.903265806Z W0216 02:09:50.903243 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.13.8:50051: connect: connection refused" 2026-02-16T02:09:50.904187438Z W0216 02:09:50.904156 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.215.101:50051: connect: connection refused" 2026-02-16T02:09:50.904565928Z W0216 02:09:50.904538 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.124.100:50051: connect: connection refused" 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909298 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909360 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909383 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909425 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909447 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909453 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909459 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909476 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909515 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909531 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909555 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909560 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909637 1 secure_serving.go:213] Serving securely on [::]:5443 2026-02-16T02:09:50.910240029Z I0216 02:09:50.909935 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::apiserver.local.config/certificates/apiserver.crt::apiserver.local.config/certificates/apiserver.key" 2026-02-16T02:09:50.913473329Z I0216 02:09:50.910615 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T02:09:51.010276262Z I0216 02:09:51.010205 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:51.010320993Z I0216 02:09:51.010292 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:51.010347453Z I0216 02:09:51.010302 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T02:09:51.010388904Z I0216 02:09:51.010289 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:51.010388904Z I0216 02:09:51.010360 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:51.010479517Z I0216 02:09:51.010311 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T02:09:51.912587947Z W0216 02:09:51.911569 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.13.8:50051: connect: connection refused" 2026-02-16T02:09:51.912587947Z W0216 02:09:51.912352 1 logging.go:55] [core] [Channel #5 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.220.224:50051: connect: connection refused" 2026-02-16T02:09:51.912587947Z W0216 02:09:51.912476 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.124.100:50051: connect: connection refused" 2026-02-16T02:09:51.912962236Z W0216 02:09:51.912879 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.215.101:50051: connect: connection refused" 2026-02-16T02:09:53.401529053Z W0216 02:09:53.399564 1 logging.go:55] [core] [Channel #5 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.220.224:50051: connect: connection refused" 2026-02-16T02:09:53.485553248Z W0216 02:09:53.485476 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.215.101:50051: connect: connection refused" 2026-02-16T02:09:53.514656291Z W0216 02:09:53.514594 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.13.8:50051: connect: connection refused" 2026-02-16T02:09:53.732598810Z W0216 02:09:53.732515 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.124.100:50051: connect: connection refused" 2026-02-16T02:09:56.083134971Z W0216 02:09:56.083016 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.215.101:50051: connect: connection refused" 2026-02-16T02:09:56.107097005Z W0216 02:09:56.106976 1 logging.go:55] [core] [Channel #5 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.220.224:50051: connect: connection refused" 2026-02-16T02:09:56.114711474Z W0216 02:09:56.114620 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.124.100:50051: connect: connection refused" 2026-02-16T02:09:56.164605743Z W0216 02:09:56.164502 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.13.8:50051: connect: connection refused" 2026-02-16T02:09:59.373586792Z W0216 02:09:59.373492 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.215.101:50051: connect: connection refused" 2026-02-16T02:09:59.919338667Z W0216 02:09:59.919050 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.13.8:50051: connect: connection refused" 2026-02-16T02:10:00.163004044Z W0216 02:10:00.162928 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.124.100:50051: connect: connection refused" 2026-02-16T02:10:00.836320587Z time="2026-02-16T02:10:00Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-02-16T02:10:00.836480440Z time="2026-02-16T02:10:00Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.124.100:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-02-16T02:10:00.844551771Z time="2026-02-16T02:10:00Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-02-16T02:10:00.844551771Z time="2026-02-16T02:10:00Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.220.224:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-02-16T02:10:00.943023665Z W0216 02:10:00.942967 1 logging.go:55] [core] [Channel #5 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.220.224:50051: connect: connection refused" 2026-02-16T02:10:03.383369675Z time="2026-02-16T02:10:03Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-02-16T02:10:03.383369675Z time="2026-02-16T02:10:03Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.13.8:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-02-16T02:10:03.571878094Z time="2026-02-16T02:10:03Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-02-16T02:10:03.571878094Z time="2026-02-16T02:10:03Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.215.101:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-02-16T02:10:04.855272238Z W0216 02:10:04.855076 1 logging.go:55] [core] [Channel #6 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.215.101:50051: connect: connection refused" 2026-02-16T02:10:05.257036330Z W0216 02:10:05.256955 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.13.8:50051: connect: connection refused" 2026-02-16T02:10:06.366203910Z W0216 02:10:06.366087 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.124.100:50051: connect: connection refused" 2026-02-16T02:10:07.844530012Z W0216 02:10:07.844403 1 logging.go:55] [core] [Channel #5 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.220.224:50051: connect: connection refused" package-server-manager_current.log0000640000000000000000000004646015144476207037335 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-tkqng2026-02-16T02:07:21.828933594Z 2026-02-16T02:07:21Z INFO setup starting manager 2026-02-16T02:07:21.831317443Z 2026-02-16T02:07:21Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-16T02:07:21.831317443Z I0216 02:07:21.831026 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-16T02:07:21.831317443Z 2026-02-16T02:07:21Z INFO controller-runtime.metrics Starting metrics server 2026-02-16T02:07:21.831317443Z 2026-02-16T02:07:21Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-16T02:07:21.831717903Z 2026-02-16T02:07:21Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-16T02:07:21.853722939Z I0216 02:07:21.853671 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-02-16T02:07:21.855301638Z 2026-02-16T02:07:21Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-02-16T02:07:21.855301638Z 2026-02-16T02:07:21Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-02-16T02:07:21.855301638Z 2026-02-16T02:07:21Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-16T02:07:21.864286661Z 2026-02-16T02:07:21Z DEBUG events package-server-manager-5c696dbdcd-tkqng_6dd9fbc2-bd44-4ed8-8f7a-629af7508324 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"1a0e127b-9ed2-47d5-81a6-c0cc79ace586","apiVersion":"coordination.k8s.io/v1","resourceVersion":"7226"}, "reason": "LeaderElection"} 2026-02-16T02:07:22.021531244Z 2026-02-16T02:07:22Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-02-16T02:07:22.024899158Z 2026-02-16T02:07:22Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-02-16T02:07:22.027544013Z 2026-02-16T02:07:22Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:22.027544013Z 2026-02-16T02:07:22Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.331107437Z 2026-02-16T02:07:22Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.331181529Z 2026-02-16T02:07:22Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:22.356706712Z 2026-02-16T02:07:22Z INFO controllers.packageserver attempting to create the packageserver csv 2026-02-16T02:07:22.361457300Z 2026-02-16T02:07:22Z INFO controllers.packageserver updating csv spec 2026-02-16T02:07:22.378598996Z 2026-02-16T02:07:22Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-02-16T02:07:22.378598996Z 2026-02-16T02:07:22Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.378697568Z 2026-02-16T02:07:22Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:22.378697568Z 2026-02-16T02:07:22Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.391125047Z 2026-02-16T02:07:22Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.396534821Z 2026-02-16T02:07:22Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:22.409428741Z 2026-02-16T02:07:22Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:22.409494633Z 2026-02-16T02:07:22Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.410528958Z 2026-02-16T02:07:22Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:22.410528958Z 2026-02-16T02:07:22Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.410528958Z 2026-02-16T02:07:22Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.410528958Z 2026-02-16T02:07:22Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:22.432893863Z 2026-02-16T02:07:22Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:22.432893863Z 2026-02-16T02:07:22Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.433259303Z 2026-02-16T02:07:22Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:22.433259303Z 2026-02-16T02:07:22Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.433342015Z 2026-02-16T02:07:22Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:22.433365885Z 2026-02-16T02:07:22Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:22.463387910Z 2026-02-16T02:07:22Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:22.463387910Z 2026-02-16T02:07:22Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:23.098527975Z 2026-02-16T02:07:23Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:23.098527975Z 2026-02-16T02:07:23Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:23.098527975Z 2026-02-16T02:07:23Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:23.098527975Z 2026-02-16T02:07:23Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:23.138257831Z 2026-02-16T02:07:23Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:23.138257831Z 2026-02-16T02:07:23Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:24.414899728Z 2026-02-16T02:07:24Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:24.414899728Z 2026-02-16T02:07:24Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:24.414899728Z 2026-02-16T02:07:24Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:24.414899728Z 2026-02-16T02:07:24Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:24.430523366Z 2026-02-16T02:07:24Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:24.430523366Z 2026-02-16T02:07:24Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:25.077674869Z 2026-02-16T02:07:25Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:25.077674869Z 2026-02-16T02:07:25Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:25.077674869Z 2026-02-16T02:07:25Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:25.077674869Z 2026-02-16T02:07:25Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:25.105496519Z 2026-02-16T02:07:25Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:25.105496519Z 2026-02-16T02:07:25Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:26.154329551Z 2026-02-16T02:07:26Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:26.154329551Z 2026-02-16T02:07:26Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:26.156936325Z 2026-02-16T02:07:26Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:26.157048008Z 2026-02-16T02:07:26Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:26.188851398Z 2026-02-16T02:07:26Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:26.188903069Z 2026-02-16T02:07:26Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.239648216Z 2026-02-16T02:07:48Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:48.239648216Z 2026-02-16T02:07:48Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.239648216Z 2026-02-16T02:07:48Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.239648216Z 2026-02-16T02:07:48Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:48.286124289Z 2026-02-16T02:07:48Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:48.286124289Z 2026-02-16T02:07:48Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.290895138Z 2026-02-16T02:07:48Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:48.290895138Z 2026-02-16T02:07:48Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.290928488Z 2026-02-16T02:07:48Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.291478332Z 2026-02-16T02:07:48Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:48.315081038Z 2026-02-16T02:07:48Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:48.315081038Z 2026-02-16T02:07:48Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.498841659Z 2026-02-16T02:07:48Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:48.498841659Z 2026-02-16T02:07:48Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.498906821Z 2026-02-16T02:07:48Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.498947142Z 2026-02-16T02:07:48Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:48.533472329Z 2026-02-16T02:07:48Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:48.533472329Z 2026-02-16T02:07:48Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.819529259Z 2026-02-16T02:07:48Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:48.819529259Z 2026-02-16T02:07:48Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.819529259Z 2026-02-16T02:07:48Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.819529259Z 2026-02-16T02:07:48Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:48.837708230Z 2026-02-16T02:07:48Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:48.837708230Z 2026-02-16T02:07:48Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.838395677Z 2026-02-16T02:07:48Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T02:07:48.838395677Z 2026-02-16T02:07:48Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.839517265Z 2026-02-16T02:07:48Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:07:48.839517265Z 2026-02-16T02:07:48Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T02:07:48.861512631Z 2026-02-16T02:07:48Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T02:07:48.861592333Z 2026-02-16T02:07:48Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T02:08:55.892319251Z E0216 02:08:55.892140 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path kube-rbac-proxy_current.log0000640000000000000000000000160415144476207036027 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-tkqng2026-02-16T02:07:12.612532739Z W0216 02:07:12.610941 1 deprecated.go:66] 2026-02-16T02:07:12.612532739Z ==== Removed Flag Warning ====================== 2026-02-16T02:07:12.612532739Z 2026-02-16T02:07:12.612532739Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T02:07:12.612532739Z 2026-02-16T02:07:12.612532739Z =============================================== 2026-02-16T02:07:12.612532739Z 2026-02-16T02:07:12.612532739Z I0216 02:07:12.611592 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T02:07:12.616631811Z I0216 02:07:12.613190 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T02:07:12.617297498Z I0216 02:07:12.617214 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-16T02:07:12.618883337Z I0216 02:07:12.617744 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000006355515144476207033352 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-6b56bd877c-qwp9g2026-02-16T02:07:25.846188132Z E0216 02:07:25.846158 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: csv in namespace with no operatorgroups" logger="UnhandledError" 2026-02-16T02:07:25.928854724Z time="2026-02-16T02:07:25Z" level=warning msg="csv in namespace with no operatorgroups" csv=packageserver id=3skWR namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:25.928854724Z time="2026-02-16T02:07:25Z" level=info msg="operatorgroup incorrect" csv=packageserver error="csv in namespace with no operatorgroups" id=3skWR namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:25.929624133Z I0216 02:07:25.929298 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"21967ed8-f1ff-4ac6-841b-720e2f0c281f", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"7461", FieldPath:""}): type: 'Warning' reason: 'NoOperatorGroup' csv in namespace with no operatorgroups 2026-02-16T02:07:25.941468297Z time="2026-02-16T02:07:25Z" level=info msg="not in operatorgroup namespace" csv=packageserver id=iz6/A namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:25.941501768Z E0216 02:07:25.941485 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: csv in namespace with no operatorgroups" logger="UnhandledError" 2026-02-16T02:07:26.103790326Z time="2026-02-16T02:07:26Z" level=warning msg="csv in namespace with no operatorgroups" csv=packageserver id=iwWqS namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:26.103969851Z time="2026-02-16T02:07:26Z" level=info msg="operatorgroup incorrect" csv=packageserver error="csv in namespace with no operatorgroups" id=iwWqS namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:26.104474233Z I0216 02:07:26.104091 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"21967ed8-f1ff-4ac6-841b-720e2f0c281f", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"7461", FieldPath:""}): type: 'Warning' reason: 'NoOperatorGroup' csv in namespace with no operatorgroups 2026-02-16T02:07:26.118122332Z time="2026-02-16T02:07:26Z" level=info msg="not in operatorgroup namespace" csv=packageserver id=YNL/3 namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:26.118280966Z E0216 02:07:26.118255 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: csv in namespace with no operatorgroups" logger="UnhandledError" 2026-02-16T02:07:26.119832754Z time="2026-02-16T02:07:26Z" level=warning msg="csv in namespace with no operatorgroups" csv=packageserver id=3FyJf namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:26.120172043Z time="2026-02-16T02:07:26Z" level=info msg="operatorgroup incorrect" csv=packageserver error="csv in namespace with no operatorgroups" id=3FyJf namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:26.120950622Z I0216 02:07:26.120319 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"21967ed8-f1ff-4ac6-841b-720e2f0c281f", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"7527", FieldPath:""}): type: 'Warning' reason: 'NoOperatorGroup' csv in namespace with no operatorgroups 2026-02-16T02:07:26.130153271Z time="2026-02-16T02:07:26Z" level=info msg="not in operatorgroup namespace" csv=packageserver id=0sZCc namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:26.130281064Z E0216 02:07:26.130256 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: csv in namespace with no operatorgroups" logger="UnhandledError" 2026-02-16T02:07:26.440490273Z time="2026-02-16T02:07:26Z" level=warning msg="csv in namespace with no operatorgroups" csv=packageserver id=3Agsv namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:26.440490273Z time="2026-02-16T02:07:26Z" level=info msg="operatorgroup incorrect" csv=packageserver error="csv in namespace with no operatorgroups" id=3Agsv namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:26.440680088Z I0216 02:07:26.440637 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"21967ed8-f1ff-4ac6-841b-720e2f0c281f", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"7527", FieldPath:""}): type: 'Warning' reason: 'NoOperatorGroup' csv in namespace with no operatorgroups 2026-02-16T02:07:26.448351989Z time="2026-02-16T02:07:26Z" level=info msg="not in operatorgroup namespace" csv=packageserver id=KHTQU namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:27.803241108Z {"level":"error","ts":"2026-02-16T02:07:27Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"681e7131-39c8-45e4-91c6-58c623566aed","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-02-16T02:07:32.924867248Z {"level":"error","ts":"2026-02-16T02:07:32Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"64751474-84ec-42f9-ba52-f87cb70f3d46","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-02-16T02:07:43.169529265Z {"level":"error","ts":"2026-02-16T02:07:43Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"4e5daaa3-dae8-4a94-83e4-0ca783a40ecb","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-02-16T02:07:47.744542637Z time="2026-02-16T02:07:47Z" level=info msg="creating cluster role: olm.og.global-operators.admin-3gjDVezhGPF6RBtOOpjEpDpKqO39v3NK8r4hmc owned by operator group: openshift-operators/global-operators" 2026-02-16T02:07:47.989665561Z time="2026-02-16T02:07:47Z" level=info msg="creating cluster role: olm.og.global-operators.edit-aFTmGKi9ZRUPJ2Dsphpd4NvovRSYjV3grbNdzM owned by operator group: openshift-operators/global-operators" 2026-02-16T02:07:48.136910566Z time="2026-02-16T02:07:48Z" level=info msg="creating cluster role: olm.og.global-operators.view-blsDheftOYMzHYeJbysGRVymD2Yx8MmrS7Yi0E owned by operator group: openshift-operators/global-operators" 2026-02-16T02:07:48.229878793Z time="2026-02-16T02:07:48Z" level=info msg="creating cluster role: olm.og.olm-operators.admin-cJW3ICOZ9Osn3oPCTb13AVfBqppCRcP8pbQVFI owned by operator group: openshift-operator-lifecycle-manager/olm-operators" 2026-02-16T02:07:48.241186204Z time="2026-02-16T02:07:48Z" level=info msg="creating cluster role: olm.og.olm-operators.edit-bVVJnBj37eRvbI1svBxms0t0mdsKB26cTBQYrx owned by operator group: openshift-operator-lifecycle-manager/olm-operators" 2026-02-16T02:07:48.255548270Z time="2026-02-16T02:07:48Z" level=info msg="creating cluster role: olm.og.olm-operators.view-8emcFsHayyHMQwkcnb9OTLvkbp0RUOKtlNrGsV owned by operator group: openshift-operator-lifecycle-manager/olm-operators" 2026-02-16T02:07:48.261191780Z time="2026-02-16T02:07:48Z" level=info msg="InstallModes now support target namespaces. Transitioning to Pending..." csv=packageserver id=3LOmf namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:48.261955909Z I0216 02:07:48.261895 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"21967ed8-f1ff-4ac6-841b-720e2f0c281f", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9040", FieldPath:""}): type: 'Normal' reason: 'RequirementsUnknown' InstallModes now support target namespaces 2026-02-16T02:07:48.358766142Z time="2026-02-16T02:07:48Z" level=info msg="InstallModes now support target namespaces. Transitioning to Pending..." csv=packageserver id=3OGUQ namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:48.360786512Z I0216 02:07:48.359142 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"21967ed8-f1ff-4ac6-841b-720e2f0c281f", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9040", FieldPath:""}): type: 'Normal' reason: 'RequirementsUnknown' InstallModes now support target namespaces 2026-02-16T02:07:48.368161725Z time="2026-02-16T02:07:48Z" level=info msg="error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" csv=packageserver id=BRM1e namespace=openshift-operator-lifecycle-manager phase=Failed 2026-02-16T02:07:48.368197306Z E0216 02:07:48.368168 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-02-16T02:07:48.479571541Z time="2026-02-16T02:07:48Z" level=info msg="scheduling ClusterServiceVersion for install" csv=packageserver id=+Pb3S namespace=openshift-operator-lifecycle-manager phase=Pending 2026-02-16T02:07:48.480239107Z I0216 02:07:48.480101 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"21967ed8-f1ff-4ac6-841b-720e2f0c281f", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9054", FieldPath:""}): type: 'Normal' reason: 'AllRequirementsMet' all requirements found, attempting install 2026-02-16T02:07:48.749857559Z W0216 02:07:48.748182 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-02-16T02:07:48.793773939Z I0216 02:07:48.793707 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"21967ed8-f1ff-4ac6-841b-720e2f0c281f", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9077", FieldPath:""}): type: 'Normal' reason: 'InstallSucceeded' waiting for install components to report healthy 2026-02-16T02:07:48.826912122Z time="2026-02-16T02:07:48Z" level=info msg="install strategy successful" csv=packageserver id=sXxxY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:48.827408364Z I0216 02:07:48.827362 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"21967ed8-f1ff-4ac6-841b-720e2f0c281f", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9134", FieldPath:""}): type: 'Normal' reason: 'InstallWaiting' apiServices not installed 2026-02-16T02:07:48.924640938Z time="2026-02-16T02:07:48Z" level=info msg="install strategy successful" csv=packageserver id=A4fRA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.025460120Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=uz1BB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.033225713Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=njrzY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.040757950Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=+2xD7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.045207860Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=t/1TN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.056235654Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=ye8pu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.063732130Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=FrQD6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.081504641Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=5zarB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.087820528Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=8Adh4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.094269388Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=n5E5h namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.100376899Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=AP+aD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.108048750Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=De4X8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.115779632Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=cCHHz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.123762130Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=vnt4w namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.130512817Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=qIFmv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.145588342Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=OSA4z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.236806496Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=2ddFo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.337242919Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=WoUkw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.437316542Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=J6gLr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.536891654Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=fcgQZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.638626009Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=OkKXq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.737358330Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=Uwbt2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.837184347Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=nwtqJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:49.936607895Z time="2026-02-16T02:07:49Z" level=info msg="install strategy successful" csv=packageserver id=I58x7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.037469599Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=N6n48 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.137016319Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=fzHWE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.237540725Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=6uvyA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.337425384Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=ZrM/e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.438368429Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=5U9As namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.538617627Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=y5q9v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.638477936Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=Pp53I namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.758800682Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=NAioQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.836820318Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=LoDqI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:50.937043556Z time="2026-02-16T02:07:50Z" level=info msg="install strategy successful" csv=packageserver id=75kxU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.037963401Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=w50AA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.139887480Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=XwH17 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.351354059Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=NlUEz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.366019983Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=2gIO4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.438151983Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=Ao+BM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.540645407Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=6n8HR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.638184358Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=Xd7H6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.740404546Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=99XqY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.893785263Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=c3k9u namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:51.940837670Z time="2026-02-16T02:07:51Z" level=info msg="install strategy successful" csv=packageserver id=OMUoH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.037100950Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=9BtHA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.136943288Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=w0FGO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.241916563Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=ezWyz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.346140190Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=0pNcd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.437947669Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=mXRws namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.538147036Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=7SkZt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.640105637Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=kgi+U namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.736946140Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=K0Tu2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.836754878Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=U3Qp0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:52.939688752Z time="2026-02-16T02:07:52Z" level=info msg="install strategy successful" csv=packageserver id=cyIJy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:53.040965136Z time="2026-02-16T02:07:53Z" level=info msg="install strategy successful" csv=packageserver id=DTV+O namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:53.140242690Z time="2026-02-16T02:07:53Z" level=info msg="install strategy successful" csv=packageserver id=ljNWo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:07:53.241731259Z time="2026-02-16T02:07:53Z" level=info msg="install strategy successful" csv=packageserver id=fsacL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:08:53.290359260Z time="2026-02-16T02:08:53Z" level=info msg="install strategy successful" csv=packageserver id=ClVrg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T02:09:53.292837865Z time="2026-02-16T02:09:53Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" catalog-operator_current.log0000640000000000000000000005741115144476207034506 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-588944557d-2z8fq2026-02-16T02:10:06.152606319Z time="2026-02-16T02:10:06Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=hWgWQ 2026-02-16T02:10:06.152606319Z time="2026-02-16T02:10:06Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=hWgWQ 2026-02-16T02:10:06.352430159Z time="2026-02-16T02:10:06Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:06.352683735Z time="2026-02-16T02:10:06Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-thm6w current-pod.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:06.352731536Z time="2026-02-16T02:10:06Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-thm6w current-pod.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:06.352774717Z time="2026-02-16T02:10:06Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=alzeB 2026-02-16T02:10:06.352807298Z time="2026-02-16T02:10:06Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:06.352841439Z time="2026-02-16T02:10:06Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:07.562090442Z time="2026-02-16T02:10:07Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=hWgWQ 2026-02-16T02:10:07.562337398Z time="2026-02-16T02:10:07Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=hWgWQ 2026-02-16T02:10:07.562411120Z time="2026-02-16T02:10:07Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=hWgWQ 2026-02-16T02:10:07.562613755Z time="2026-02-16T02:10:07Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=hWgWQ 2026-02-16T02:10:07.562674876Z time="2026-02-16T02:10:07Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=hWgWQ 2026-02-16T02:10:07.562790279Z time="2026-02-16T02:10:07Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:07.562853401Z time="2026-02-16T02:10:07Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:07.690186281Z time="2026-02-16T02:10:07Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:07.690328835Z time="2026-02-16T02:10:07Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-thm6w current-pod.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:07.690328835Z time="2026-02-16T02:10:07Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-thm6w current-pod.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:07.690544050Z time="2026-02-16T02:10:07Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:07.690544050Z time="2026-02-16T02:10:07Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=alzeB 2026-02-16T02:10:07.690645493Z time="2026-02-16T02:10:07Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:07.690645493Z time="2026-02-16T02:10:07Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:08.207726917Z time="2026-02-16T02:10:08Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:08.207836120Z time="2026-02-16T02:10:08Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gkbtj current-pod.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:08.207836120Z time="2026-02-16T02:10:08Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gkbtj current-pod.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:08.207855030Z time="2026-02-16T02:10:08Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=kK5RK 2026-02-16T02:10:08.207882261Z time="2026-02-16T02:10:08Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:08.207915332Z time="2026-02-16T02:10:08Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:08.473122784Z time="2026-02-16T02:10:08Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:08.473122784Z time="2026-02-16T02:10:08Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-9c6g5 current-pod.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:08.473122784Z time="2026-02-16T02:10:08Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-9c6g5 current-pod.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:08.473122784Z time="2026-02-16T02:10:08Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=SduvR 2026-02-16T02:10:08.473122784Z time="2026-02-16T02:10:08Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:08.473122784Z time="2026-02-16T02:10:08Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:09.392523824Z time="2026-02-16T02:10:09Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:09.392884043Z time="2026-02-16T02:10:09Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gkbtj current-pod.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:09.393050117Z time="2026-02-16T02:10:09Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gkbtj current-pod.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:09.393264173Z time="2026-02-16T02:10:09Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:09.393338114Z time="2026-02-16T02:10:09Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=kK5RK 2026-02-16T02:10:09.393502049Z time="2026-02-16T02:10:09Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:09.393584721Z time="2026-02-16T02:10:09Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:09.657524312Z time="2026-02-16T02:10:09Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:09.657524312Z time="2026-02-16T02:10:09Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-9c6g5 current-pod.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:09.657524312Z time="2026-02-16T02:10:09Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-9c6g5 current-pod.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:09.657524312Z time="2026-02-16T02:10:09Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:09.657524312Z time="2026-02-16T02:10:09Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SduvR 2026-02-16T02:10:09.657524312Z time="2026-02-16T02:10:09Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:09.657524312Z time="2026-02-16T02:10:09Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:10.150256422Z time="2026-02-16T02:10:10Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:10.150331394Z time="2026-02-16T02:10:10Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:10.150340864Z time="2026-02-16T02:10:10Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:10.150378045Z time="2026-02-16T02:10:10Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=zp+NR 2026-02-16T02:10:10.150378045Z time="2026-02-16T02:10:10Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:10.150378045Z time="2026-02-16T02:10:10Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:10.352165932Z time="2026-02-16T02:10:10Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:10.352290865Z time="2026-02-16T02:10:10Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-thm6w current-pod.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:10.352312076Z time="2026-02-16T02:10:10Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-thm6w current-pod.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:10.352344557Z time="2026-02-16T02:10:10Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=WnHqq 2026-02-16T02:10:10.352344557Z time="2026-02-16T02:10:10Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:10.352373267Z time="2026-02-16T02:10:10Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:11.351848965Z time="2026-02-16T02:10:11Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:11.351998489Z time="2026-02-16T02:10:11Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:11.352038380Z time="2026-02-16T02:10:11Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:11.352219924Z time="2026-02-16T02:10:11Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:11.352219924Z time="2026-02-16T02:10:11Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=zp+NR 2026-02-16T02:10:11.352239134Z time="2026-02-16T02:10:11Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:11.352285516Z time="2026-02-16T02:10:11Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:11.621463705Z time="2026-02-16T02:10:11Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:11.621463705Z time="2026-02-16T02:10:11Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-thm6w current-pod.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:11.621668471Z time="2026-02-16T02:10:11Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-thm6w current-pod.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:11.621668471Z time="2026-02-16T02:10:11Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:11.621668471Z time="2026-02-16T02:10:11Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=WnHqq 2026-02-16T02:10:11.621668471Z time="2026-02-16T02:10:11Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:11.621728852Z time="2026-02-16T02:10:11Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:12.150379293Z time="2026-02-16T02:10:12Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:12.150950808Z time="2026-02-16T02:10:12Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:12.150950808Z time="2026-02-16T02:10:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:12.150950808Z time="2026-02-16T02:10:12Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=GGpyx 2026-02-16T02:10:12.150950808Z time="2026-02-16T02:10:12Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:12.150950808Z time="2026-02-16T02:10:12Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:12.352181076Z time="2026-02-16T02:10:12Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:12.352306059Z time="2026-02-16T02:10:12Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gkbtj current-pod.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:12.352306059Z time="2026-02-16T02:10:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gkbtj current-pod.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:12.352346580Z time="2026-02-16T02:10:12Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=mGLmy 2026-02-16T02:10:12.352346580Z time="2026-02-16T02:10:12Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:12.352358210Z time="2026-02-16T02:10:12Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:13.351884269Z time="2026-02-16T02:10:13Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:13.352062693Z time="2026-02-16T02:10:13Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:13.352062693Z time="2026-02-16T02:10:13Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s95k9 current-pod.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:13.352262828Z time="2026-02-16T02:10:13Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:13.352262828Z time="2026-02-16T02:10:13Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=GGpyx 2026-02-16T02:10:13.352346051Z time="2026-02-16T02:10:13Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=JnHDi 2026-02-16T02:10:13.352386662Z time="2026-02-16T02:10:13Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=JnHDi 2026-02-16T02:10:13.551948666Z time="2026-02-16T02:10:13Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:13.552038259Z time="2026-02-16T02:10:13Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gkbtj current-pod.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:13.552057789Z time="2026-02-16T02:10:13Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gkbtj current-pod.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:13.552312286Z time="2026-02-16T02:10:13Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:13.552312286Z time="2026-02-16T02:10:13Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=mGLmy 2026-02-16T02:10:13.552408048Z time="2026-02-16T02:10:13Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+QNmG 2026-02-16T02:10:13.552408048Z time="2026-02-16T02:10:13Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+QNmG config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_current.log0000640000000000000000000001055315144476207031461 0ustar00000000000000002026-02-16T02:09:33.470712534Z I0216 02:09:33.470518 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-16T02:09:33.470989141Z I0216 02:09:33.470937 1 observer_polling.go:159] Starting file observer 2026-02-16T02:09:33.471027582Z I0216 02:09:33.471002 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T02:09:33.471083144Z I0216 02:09:33.471046 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T02:09:33.471683899Z I0216 02:09:33.471613 1 observer_polling.go:159] Starting file observer 2026-02-16T02:09:35.887642683Z I0216 02:09:35.887572 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601171614.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-16T02:09:50.743499370Z I0216 02:09:50.743383 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T02:09:50.743499370Z W0216 02:09:50.743420 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:09:50.743499370Z W0216 02:09:50.743427 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:09:50.743659044Z W0216 02:09:50.743617 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T02:09:50.743659044Z W0216 02:09:50.743627 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T02:09:50.743659044Z W0216 02:09:50.743632 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T02:09:50.743659044Z W0216 02:09:50.743636 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T02:09:50.765987058Z I0216 02:09:50.762851 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T02:09:50.765987058Z I0216 02:09:50.762942 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T02:09:50.765987058Z I0216 02:09:50.763003 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:09:50.765987058Z I0216 02:09:50.763028 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:50.765987058Z I0216 02:09:50.763073 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:09:50.765987058Z I0216 02:09:50.763088 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:50.765987058Z I0216 02:09:50.764957 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T02:09:50.765987058Z I0216 02:09:50.765018 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T02:09:50.765987058Z I0216 02:09:50.765232 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T02:09:50.765987058Z I0216 02:09:50.765570 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T02:09:50.766299666Z I0216 02:09:50.766108 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-02-16T02:09:50.864868982Z I0216 02:09:50.864062 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:50.864868982Z I0216 02:09:50.864143 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T02:09:50.864868982Z I0216 02:09:50.864232 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-htjgz/etcd-operator_previous.log0000640000000000000000000004143215144476207031653 0ustar00000000000000002026-02-16T02:08:13.585298523Z I0216 02:08:13.585289 1 base_controller.go:181] Shutting down GuardController ... 2026-02-16T02:08:13.585315353Z I0216 02:08:13.584890 1 base_controller.go:181] Shutting down ClusterMemberRemovalController ... 2026-02-16T02:08:13.585374455Z I0216 02:08:13.585339 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-02-16T02:08:13.585479188Z I0216 02:08:13.585396 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-02-16T02:08:13.585580400Z I0216 02:08:13.585538 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-02-16T02:08:13.585580400Z I0216 02:08:13.585557 1 builder.go:335] server exited 2026-02-16T02:08:13.585635721Z I0216 02:08:13.585613 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-02-16T02:08:13.585685793Z I0216 02:08:13.585657 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-02-16T02:08:13.586403060Z E0216 02:08:13.586332 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-02-16T02:08:13.586524873Z I0216 02:08:13.586470 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-02-16T02:08:13.586524873Z I0216 02:08:13.586487 1 base_controller.go:181] Shutting down FSyncController ... 2026-02-16T02:08:13.586524873Z I0216 02:08:13.586497 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-02-16T02:08:13.586552314Z I0216 02:08:13.586521 1 base_controller.go:123] Shutting down worker of etcd-UnsupportedConfigOverrides controller ... 2026-02-16T02:08:13.586552314Z I0216 02:08:13.586534 1 base_controller.go:113] All etcd-UnsupportedConfigOverrides workers have been terminated 2026-02-16T02:08:13.586568435Z I0216 02:08:13.586550 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-02-16T02:08:13.586583815Z I0216 02:08:13.586565 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-02-16T02:08:13.586583815Z I0216 02:08:13.586576 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-02-16T02:08:13.586648727Z I0216 02:08:13.586596 1 base_controller.go:123] Shutting down worker of FSyncController controller ... 2026-02-16T02:08:13.586648727Z I0216 02:08:13.586619 1 base_controller.go:113] All FSyncController workers have been terminated 2026-02-16T02:08:13.586648727Z I0216 02:08:13.586641 1 base_controller.go:123] Shutting down worker of EtcdMembersController controller ... 2026-02-16T02:08:13.586666567Z I0216 02:08:13.586655 1 base_controller.go:113] All EtcdMembersController workers have been terminated 2026-02-16T02:08:13.586681917Z I0216 02:08:13.586662 1 base_controller.go:123] Shutting down worker of EtcdCertCleanerController controller ... 2026-02-16T02:08:13.586707558Z I0216 02:08:13.586680 1 base_controller.go:113] All EtcdCertCleanerController workers have been terminated 2026-02-16T02:08:13.586770060Z I0216 02:08:13.586728 1 base_controller.go:123] Shutting down worker of StatusSyncer_etcd controller ... 2026-02-16T02:08:13.586770060Z I0216 02:08:13.586746 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-02-16T02:08:13.586770060Z I0216 02:08:13.586764 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-02-16T02:08:13.586793350Z I0216 02:08:13.586779 1 base_controller.go:113] All Installer workers have been terminated 2026-02-16T02:08:13.586812381Z I0216 02:08:13.586790 1 controller_manager.go:54] Installer controller terminated 2026-02-16T02:08:13.586812381Z E0216 02:08:13.586792 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-02-16T02:08:13.586828551Z I0216 02:08:13.586817 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-02-16T02:08:13.586843861Z I0216 02:08:13.586832 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-02-16T02:08:13.586954124Z E0216 02:08:13.586889 1 leaderelection.go:436] error retrieving resource lock openshift-etcd-operator/openshift-cluster-etcd-operator-lock: client rate limiter Wait returned an error: context canceled 2026-02-16T02:08:13.586954124Z I0216 02:08:13.586912 1 base_controller.go:181] Shutting down DefragController ... 2026-02-16T02:08:13.586954124Z I0216 02:08:13.586939 1 base_controller.go:181] Shutting down etcd-operator-UnsupportedConfigOverrides ... 2026-02-16T02:08:13.586973275Z I0216 02:08:13.586963 1 base_controller.go:181] Shutting down etcd-StaticPodState ... 2026-02-16T02:08:13.587076857Z I0216 02:08:13.587024 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-02-16T02:08:13.587076857Z I0216 02:08:13.587050 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-02-16T02:08:13.587076857Z I0216 02:08:13.587058 1 controller_manager.go:54] etcd-Node controller terminated 2026-02-16T02:08:13.587095388Z I0216 02:08:13.587078 1 base_controller.go:181] Shutting down ScriptController ... 2026-02-16T02:08:13.587142699Z I0216 02:08:13.587103 1 leaderelection.go:297] failed to renew lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock: timed out waiting for the condition 2026-02-16T02:08:13.587408655Z I0216 02:08:13.587357 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-02-16T02:08:13.587408655Z I0216 02:08:13.587392 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-02-16T02:08:13.587425836Z I0216 02:08:13.587406 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-02-16T02:08:13.587463367Z I0216 02:08:13.587425 1 base_controller.go:181] Shutting down etcd-InstallerState ... 2026-02-16T02:08:13.587603220Z E0216 02:08:13.587548 1 base_controller.go:279] "Unhandled Error" err="etcd-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-02-16T02:08:13.587603220Z I0216 02:08:13.587583 1 base_controller.go:181] Shutting down PruneController ... 2026-02-16T02:08:13.587620651Z I0216 02:08:13.587605 1 envvarcontroller.go:252] Shutting down EnvVarController 2026-02-16T02:08:13.587645271Z I0216 02:08:13.587630 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-02-16T02:08:13.587660422Z I0216 02:08:13.587643 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-02-16T02:08:13.587660422Z I0216 02:08:13.587651 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-02-16T02:08:13.587785635Z I0216 02:08:13.587721 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-02-16T02:08:13.587785635Z I0216 02:08:13.587767 1 base_controller.go:113] All GuardController workers have been terminated 2026-02-16T02:08:13.587807365Z I0216 02:08:13.587782 1 controller_manager.go:54] GuardController controller terminated 2026-02-16T02:08:13.587807365Z I0216 02:08:13.587795 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-02-16T02:08:13.587826816Z I0216 02:08:13.587809 1 base_controller.go:113] All PruneController workers have been terminated 2026-02-16T02:08:13.587826816Z I0216 02:08:13.587818 1 controller_manager.go:54] PruneController controller terminated 2026-02-16T02:08:13.587907878Z I0216 02:08:13.587843 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-02-16T02:08:13.587907878Z I0216 02:08:13.587878 1 base_controller.go:113] All etcd workers have been terminated 2026-02-16T02:08:13.587907878Z E0216 02:08:13.587892 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-16T02:08:13.587928178Z I0216 02:08:13.587913 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-16T02:08:13.587947169Z I0216 02:08:13.587934 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-16T02:08:13.588020061Z I0216 02:08:13.587959 1 base_controller.go:123] Shutting down worker of etcd-operator-UnsupportedConfigOverrides controller ... 2026-02-16T02:08:13.588020061Z I0216 02:08:13.587992 1 base_controller.go:113] All etcd-operator-UnsupportedConfigOverrides workers have been terminated 2026-02-16T02:08:13.588020061Z I0216 02:08:13.588002 1 base_controller.go:123] Shutting down worker of DefragController controller ... 2026-02-16T02:08:13.588043661Z I0216 02:08:13.588022 1 base_controller.go:113] All DefragController workers have been terminated 2026-02-16T02:08:13.588166124Z E0216 02:08:13.588105 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-all-bundles\": context canceled" 2026-02-16T02:08:13.588166124Z I0216 02:08:13.588122 1 controller_manager.go:54] etcd-operator-UnsupportedConfigOverrides controller terminated 2026-02-16T02:08:13.588217966Z I0216 02:08:13.588189 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-02-16T02:08:13.588217966Z I0216 02:08:13.588210 1 base_controller.go:113] All RevisionController workers have been terminated 2026-02-16T02:08:13.588234286Z I0216 02:08:13.588219 1 controller_manager.go:54] RevisionController controller terminated 2026-02-16T02:08:13.588360799Z E0216 02:08:13.588301 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts\": context canceled" 2026-02-16T02:08:13.588495202Z I0216 02:08:13.588412 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"efb077aa-be7e-43d7-bf98-adfa88c03bf6", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-02-16T02:08:13.588863462Z I0216 02:08:13.588808 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-02-16T02:08:13.588863462Z I0216 02:08:13.588836 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-02-16T02:08:13.588863462Z I0216 02:08:13.588845 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-02-16T02:08:13.589046266Z I0216 02:08:13.588994 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-02-16T02:08:13.589113658Z I0216 02:08:13.589076 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-02-16T02:08:13.589113658Z I0216 02:08:13.589092 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-02-16T02:08:13.589458336Z I0216 02:08:13.589379 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-02-16T02:08:13.589458336Z I0216 02:08:13.589403 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-02-16T02:08:13.589458336Z I0216 02:08:13.589410 1 base_controller.go:113] All ScriptController workers have been terminated 2026-02-16T02:08:13.589458336Z I0216 02:08:13.589420 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-02-16T02:08:13.589610090Z E0216 02:08:13.589510 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-02-16T02:08:13.590407070Z E0216 02:08:13.590286 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd\": context canceled, \"etcd/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-16T02:08:13.590823060Z I0216 02:08:13.590753 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-02-16T02:08:13.590823060Z I0216 02:08:13.590792 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-02-16T02:08:13.590823060Z I0216 02:08:13.590804 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-02-16T02:08:13.591974049Z I0216 02:08:13.591912 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-02-16T02:08:13.591974049Z I0216 02:08:13.591949 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-02-16T02:08:18.584065965Z I0216 02:08:18.583951 1 observer_polling.go:162] Shutting down file observer 2026-02-16T02:08:24.280144893Z W0216 02:08:24.280014 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-16T02:08:24.282059650Z E0216 02:08:24.281990 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-02-16T02:08:24.283332452Z I0216 02:08:24.283257 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-02-16T02:08:24.283354672Z I0216 02:08:24.283335 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-02-16T02:08:26.346878931Z W0216 02:08:26.346745 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-16T02:08:28.347108598Z I0216 02:08:28.346986 1 etcdcli_pool.go:70] creating a new cached client 2026-02-16T02:08:43.349366850Z W0216 02:08:43.349208 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-16T02:08:47.350286064Z I0216 02:08:47.350123 1 etcdcli_pool.go:70] creating a new cached client 2026-02-16T02:08:47.591810699Z E0216 02:08:47.591649 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-16T02:08:47.591810699Z W0216 02:08:47.591728 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-htjgz.json0000640000000000000000000001576315144476207024403 0ustar0000000000000000{"metadata":{"name":"etcd-operator-67bf55ccdd-htjgz","generateName":"etcd-operator-67bf55ccdd-","namespace":"openshift-etcd-operator","uid":"724ac845-3835-458b-9645-e665be135ff9","resourceVersion":"9274","creationTimestamp":"2026-02-16T02:05:16Z","labels":{"app":"etcd-operator","pod-template-hash":"67bf55ccdd"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-67bf55ccdd","uid":"c84ba652-34e0-449e-b739-41a8a8b03c89","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-bff42","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-bff42","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-02-16T02:06:28Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-02-16T02:09:33Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T02:06:53Z","finishedAt":"2026-02-16T02:08:47Z","containerID":"cri-o://7d8525382e7c303df250ff37074c2b59dae064f1c16fab17985b8492c29587df"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","containerID":"cri-o://f4cc6bf86c33c3e578a43a1648d54a69838bb79c81f9072d23717330a60f1d97","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-bff42","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002745715144476207033724 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-578b9bc556-8g98v2026-02-16T02:07:33.497755797Z W0216 02:07:33.497556 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-16T02:07:33.498120787Z I0216 02:07:33.498099 1 crypto.go:601] Generating new CA for check-endpoints-signer@1771207653 cert, and key in /tmp/serving-cert-1858777360/serving-signer.crt, /tmp/serving-cert-1858777360/serving-signer.key 2026-02-16T02:07:34.487850592Z I0216 02:07:34.486223 1 observer_polling.go:159] Starting file observer 2026-02-16T02:07:35.019707513Z I0216 02:07:35.019643 1 builder.go:304] check-endpoints version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-16T02:07:35.021245641Z I0216 02:07:35.020858 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-1858777360/tls.crt::/tmp/serving-cert-1858777360/tls.key" 2026-02-16T02:07:35.527203360Z I0216 02:07:35.527114 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T02:07:35.529028535Z I0216 02:07:35.528949 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T02:07:35.529028535Z I0216 02:07:35.528970 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T02:07:35.529028535Z I0216 02:07:35.528994 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T02:07:35.529028535Z I0216 02:07:35.528999 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T02:07:35.534988473Z I0216 02:07:35.534245 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T02:07:35.534988473Z W0216 02:07:35.534299 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:07:35.534988473Z W0216 02:07:35.534311 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:07:35.534988473Z W0216 02:07:35.534320 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T02:07:35.534988473Z W0216 02:07:35.534329 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T02:07:35.534988473Z W0216 02:07:35.534335 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T02:07:35.534988473Z W0216 02:07:35.534341 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T02:07:35.534988473Z I0216 02:07:35.534753 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T02:07:35.547907723Z I0216 02:07:35.547702 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1858777360/tls.crt::/tmp/serving-cert-1858777360/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771207653\" (2026-02-16 02:07:33 +0000 UTC to 2026-03-18 02:07:34 +0000 UTC (now=2026-02-16 02:07:35.547671478 +0000 UTC))" 2026-02-16T02:07:35.547907723Z I0216 02:07:35.547828 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207655\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207655\" (2026-02-16 01:07:35 +0000 UTC to 2027-02-16 01:07:35 +0000 UTC (now=2026-02-16 02:07:35.547808321 +0000 UTC))" 2026-02-16T02:07:35.547907723Z I0216 02:07:35.547849 1 secure_serving.go:213] Serving securely on [::]:17698 2026-02-16T02:07:35.547907723Z I0216 02:07:35.547878 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T02:07:35.547970215Z I0216 02:07:35.547911 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T02:07:35.547970215Z I0216 02:07:35.547947 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T02:07:35.548018676Z I0216 02:07:35.547981 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-1858777360/tls.crt::/tmp/serving-cert-1858777360/tls.key" 2026-02-16T02:07:35.548165690Z I0216 02:07:35.548121 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T02:07:35.548295523Z I0216 02:07:35.548258 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:07:35.548295523Z I0216 02:07:35.548271 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:07:35.548295523Z I0216 02:07:35.548283 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:07:35.548295523Z I0216 02:07:35.548287 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:07:35.548388275Z I0216 02:07:35.548352 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T02:07:35.548388275Z I0216 02:07:35.548364 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T02:07:35.550357184Z I0216 02:07:35.550295 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:07:35.551133153Z I0216 02:07:35.551077 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-02-16T02:07:35.551701018Z I0216 02:07:35.551636 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:07:35.552004105Z I0216 02:07:35.551953 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:07:35.649714190Z I0216 02:07:35.649626 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:07:35.649714190Z I0216 02:07:35.649702 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:07:35.649829553Z I0216 02:07:35.649788 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T02:07:35.649965646Z I0216 02:07:35.649927 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2026-02-17 01:56:48 +0000 UTC (now=2026-02-16 02:07:35.649887795 +0000 UTC))" 2026-02-16T02:07:35.650171482Z I0216 02:07:35.650120 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1858777360/tls.crt::/tmp/serving-cert-1858777360/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771207653\" (2026-02-16 02:07:33 +0000 UTC to 2026-03-18 02:07:34 +0000 UTC (now=2026-02-16 02:07:35.65009988 +0000 UTC))" 2026-02-16T02:07:35.650316045Z I0216 02:07:35.650268 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207655\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207655\" (2026-02-16 01:07:35 +0000 UTC to 2027-02-16 01:07:35 +0000 UTC (now=2026-02-16 02:07:35.650251384 +0000 UTC))" 2026-02-16T02:07:35.650457559Z I0216 02:07:35.650408 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 01:50:24 +0000 UTC to 2036-02-14 01:50:24 +0000 UTC (now=2026-02-16 02:07:35.650392807 +0000 UTC))" 2026-02-16T02:07:35.650478349Z I0216 02:07:35.650459 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2026-02-17 01:56:50 +0000 UTC (now=2026-02-16 02:07:35.650425048 +0000 UTC))" 2026-02-16T02:07:35.650491109Z I0216 02:07:35.650478 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2027-02-16 01:56:50 +0000 UTC (now=2026-02-16 02:07:35.650466579 +0000 UTC))" 2026-02-16T02:07:35.650528300Z I0216 02:07:35.650501 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2027-02-16 01:56:50 +0000 UTC (now=2026-02-16 02:07:35.650485359 +0000 UTC))" 2026-02-16T02:07:35.650541791Z I0216 02:07:35.650523 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2036-02-14 01:56:48 +0000 UTC (now=2026-02-16 02:07:35.6505118 +0000 UTC))" 2026-02-16T02:07:35.650554131Z I0216 02:07:35.650543 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2026-02-17 01:56:48 +0000 UTC (now=2026-02-16 02:07:35.650531611 +0000 UTC))" 2026-02-16T02:07:35.650719235Z I0216 02:07:35.650676 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1858777360/tls.crt::/tmp/serving-cert-1858777360/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771207653\" (2026-02-16 02:07:33 +0000 UTC to 2026-03-18 02:07:34 +0000 UTC (now=2026-02-16 02:07:35.650662664 +0000 UTC))" 2026-02-16T02:07:35.650895470Z I0216 02:07:35.650853 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207655\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207655\" (2026-02-16 01:07:35 +0000 UTC to 2027-02-16 01:07:35 +0000 UTC (now=2026-02-16 02:07:35.650836078 +0000 UTC))" 2026-02-16T02:07:35.897738666Z I0216 02:07:35.897679 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:07:35.951640874Z I0216 02:07:35.951585 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-02-16T02:07:35.951695656Z I0216 02:07:35.951683 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-578b9bc556-8g98v/openshift-apiserver_current.log0000640000000000000000000011723015144476207030714 0ustar00000000000000002026-02-16T02:09:53.216816898Z E0216 02:09:53.216790 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.216901890Z E0216 02:09:53.216853 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.216990712Z E0216 02:09:53.216943 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.219926315Z E0216 02:09:53.219875 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.219926315Z E0216 02:09:53.219883 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.219971496Z E0216 02:09:53.219948 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.219991997Z E0216 02:09:53.219963 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.220163801Z E0216 02:09:53.220091 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.220163801Z E0216 02:09:53.220150 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.225544005Z E0216 02:09:53.225491 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.225698929Z E0216 02:09:53.225647 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.235604314Z E0216 02:09:53.231173 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.235604314Z E0216 02:09:53.231246 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.235604314Z E0216 02:09:53.232015 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.235604314Z E0216 02:09:53.232070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.235604314Z E0216 02:09:53.235009 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.235604314Z E0216 02:09:53.235043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.239527652Z E0216 02:09:53.239483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.239527652Z E0216 02:09:53.239503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.248331360Z E0216 02:09:53.248190 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.248511635Z E0216 02:09:53.248466 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.257781415Z E0216 02:09:53.257730 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.257949009Z E0216 02:09:53.257913 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.267167288Z E0216 02:09:53.267070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.267329282Z E0216 02:09:53.267226 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.276497179Z E0216 02:09:53.276449 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.276497179Z E0216 02:09:53.276478 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.286472407Z E0216 02:09:53.286384 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.286586450Z E0216 02:09:53.286527 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.292633560Z E0216 02:09:53.292198 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.292633560Z E0216 02:09:53.292262 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.301721565Z E0216 02:09:53.301627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.301721565Z E0216 02:09:53.301660 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.312217446Z E0216 02:09:53.312129 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.312217446Z E0216 02:09:53.312195 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.322879451Z E0216 02:09:53.322763 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.339374620Z E0216 02:09:53.339270 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.339601056Z E0216 02:09:53.339515 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.357492610Z E0216 02:09:53.357402 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.372654786Z E0216 02:09:53.372384 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.376484041Z E0216 02:09:53.372974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.389896474Z E0216 02:09:53.386798 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.389896474Z E0216 02:09:53.387237 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.401480432Z E0216 02:09:53.397956 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.408464005Z E0216 02:09:53.407932 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.408464005Z E0216 02:09:53.408297 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:53.422404651Z E0216 02:09:53.422340 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:54.248546446Z E0216 02:09:54.241656 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:54.248546446Z E0216 02:09:54.241863 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:54.248546446Z E0216 02:09:54.242016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:54.248546446Z E0216 02:09:54.242016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:54.248546446Z E0216 02:09:54.242086 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:54.248546446Z E0216 02:09:54.242135 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:54.248546446Z E0216 02:09:54.242303 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:54.248546446Z E0216 02:09:54.242355 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.584710381Z E0216 02:09:59.584651 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.585215763Z E0216 02:09:59.585186 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.585527641Z E0216 02:09:59.585485 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.585582013Z E0216 02:09:59.585555 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.585645724Z E0216 02:09:59.585608 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.684027226Z E0216 02:09:59.683967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.684248631Z E0216 02:09:59.684150 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.684638981Z E0216 02:09:59.684491 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.684638981Z E0216 02:09:59.684536 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.684743524Z E0216 02:09:59.684707 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.684743524Z E0216 02:09:59.684726 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.684887777Z E0216 02:09:59.684861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.684887777Z E0216 02:09:59.684874 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.684955449Z E0216 02:09:59.684917 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.685081742Z E0216 02:09:59.685049 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.965484742Z E0216 02:09:59.965186 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.965484742Z E0216 02:09:59.965229 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.967501482Z E0216 02:09:59.965577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.967501482Z E0216 02:09:59.965836 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.967501482Z E0216 02:09:59.965862 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.967501482Z E0216 02:09:59.965932 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.967501482Z E0216 02:09:59.965982 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.967501482Z E0216 02:09:59.966020 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.967501482Z E0216 02:09:59.966044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:09:59.967501482Z E0216 02:09:59.965865 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.084676820Z E0216 02:10:00.082355 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.084747672Z E0216 02:10:00.082456 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.084747672Z E0216 02:10:00.082471 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.084747672Z E0216 02:10:00.082473 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.084747672Z E0216 02:10:00.082594 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.591385607Z E0216 02:10:00.591284 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.591471089Z E0216 02:10:00.591376 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.592014683Z E0216 02:10:00.591911 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.592310590Z E0216 02:10:00.592152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.592968876Z E0216 02:10:00.592890 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.906374915Z E0216 02:10:00.906313 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.907526184Z E0216 02:10:00.906873 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.907526184Z E0216 02:10:00.906878 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.911578234Z E0216 02:10:00.910755 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:00.911578234Z E0216 02:10:00.910784 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:01.259052939Z E0216 02:10:01.258996 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:01.259089350Z E0216 02:10:01.259041 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:01.259110420Z E0216 02:10:01.259083 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:01.259144051Z E0216 02:10:01.259008 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" 2026-02-16T02:10:01.259314935Z E0216 02:10:01.259129 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6522307225692026123, SKID=A4:39:EA:C9:8D:54:D9:CA:2F:7A:39:FA:AF:F4:AA:41:2F:7B:77:C4, AKID=84:22:1E:CC:77:FD:17:E9:16:A4:D2:D7:2D:85:C6:00:A5:41:37:E2 failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000005632115144476207040422 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-6d4655d9cf-v7lmz2026-02-16T02:09:57.057388392Z E0216 02:09:57.057289 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T02:09:57.057388392Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401 2026-02-16T02:09:57.057388392Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T02:09:57.057388392Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401 2026-02-16T02:09:57.057388392Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401 2026-02-16T02:09:57.057388392Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401 2026-02-16T02:09:57.057388392Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401 2026-02-16T02:09:57.057388392Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401 2026-02-16T02:09:57.057388392Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401 2026-02-16T02:09:57.057388392Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401 2026-02-16T02:09:57.057388392Z > 2026-02-16T02:09:58.859430160Z E0216 02:09:58.859338 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T02:09:58.859430160Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401 2026-02-16T02:09:58.859430160Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T02:09:58.859430160Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401 2026-02-16T02:09:58.859430160Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401 2026-02-16T02:09:58.859430160Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401 2026-02-16T02:09:58.859430160Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401 2026-02-16T02:09:58.859430160Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401 2026-02-16T02:09:58.859430160Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401 2026-02-16T02:09:58.859430160Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401 2026-02-16T02:09:58.859430160Z > 2026-02-16T02:10:00.659967249Z E0216 02:10:00.657690 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T02:10:00.659967249Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401 2026-02-16T02:10:00.659967249Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T02:10:00.659967249Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401 2026-02-16T02:10:00.659967249Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401 2026-02-16T02:10:00.659967249Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401 2026-02-16T02:10:00.659967249Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401 2026-02-16T02:10:00.659967249Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401 2026-02-16T02:10:00.659967249Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401 2026-02-16T02:10:00.659967249Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401 2026-02-16T02:10:00.659967249Z > 2026-02-16T02:10:02.457175467Z E0216 02:10:02.457059 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T02:10:02.457175467Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401 2026-02-16T02:10:02.457175467Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T02:10:02.457175467Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401 2026-02-16T02:10:02.457175467Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401 2026-02-16T02:10:02.457175467Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401 2026-02-16T02:10:02.457175467Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401 2026-02-16T02:10:02.457175467Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401 2026-02-16T02:10:02.457175467Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401 2026-02-16T02:10:02.457175467Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401 2026-02-16T02:10:02.457175467Z > 2026-02-16T02:10:04.256006154Z E0216 02:10:04.255960 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T02:10:04.256006154Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401 2026-02-16T02:10:04.256006154Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T02:10:04.256006154Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401 2026-02-16T02:10:04.256006154Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401 2026-02-16T02:10:04.256006154Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401 2026-02-16T02:10:04.256006154Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401 2026-02-16T02:10:04.256006154Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401 2026-02-16T02:10:04.256006154Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401 2026-02-16T02:10:04.256006154Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401 2026-02-16T02:10:04.256006154Z > 2026-02-16T02:10:06.059803665Z E0216 02:10:06.059655 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T02:10:06.059803665Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401 2026-02-16T02:10:06.059803665Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T02:10:06.059803665Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401 2026-02-16T02:10:06.059803665Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401 2026-02-16T02:10:06.059803665Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401 2026-02-16T02:10:06.059803665Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401 2026-02-16T02:10:06.059803665Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401 2026-02-16T02:10:06.059803665Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401 2026-02-16T02:10:06.059803665Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401 2026-02-16T02:10:06.059803665Z > 2026-02-16T02:10:08.000471323Z E0216 02:10:07.999391 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T02:10:08.000471323Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401 2026-02-16T02:10:08.000471323Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T02:10:08.000471323Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401 2026-02-16T02:10:08.000471323Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401 2026-02-16T02:10:08.000471323Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401 2026-02-16T02:10:08.000471323Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401 2026-02-16T02:10:08.000471323Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401 2026-02-16T02:10:08.000471323Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401 2026-02-16T02:10:08.000471323Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401 2026-02-16T02:10:08.000471323Z > 2026-02-16T02:10:09.739678171Z E0216 02:10:09.738610 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T02:10:09.739678171Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401 2026-02-16T02:10:09.739678171Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T02:10:09.739678171Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401 2026-02-16T02:10:09.739678171Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401 2026-02-16T02:10:09.739678171Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401 2026-02-16T02:10:09.739678171Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401 2026-02-16T02:10:09.739678171Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401 2026-02-16T02:10:09.739678171Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401 2026-02-16T02:10:09.739678171Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401 2026-02-16T02:10:09.739678171Z > 2026-02-16T02:10:11.455837279Z E0216 02:10:11.455787 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T02:10:11.455837279Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401 2026-02-16T02:10:11.455837279Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T02:10:11.455837279Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401 2026-02-16T02:10:11.455837279Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401 2026-02-16T02:10:11.455837279Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401 2026-02-16T02:10:11.455837279Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401 2026-02-16T02:10:11.455837279Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401 2026-02-16T02:10:11.455837279Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401 2026-02-16T02:10:11.455837279Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401 2026-02-16T02:10:11.455837279Z > 2026-02-16T02:10:12.095363122Z I0216 02:10:12.095224 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. openshift-apiserver-operator_previous.log0000640000000000000000000000162315144476207040607 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-6d4655d9cf-v7lmz2026-02-16T02:07:52.864993478Z I0216 02:07:52.864772 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T02:07:52.865140862Z I0216 02:07:52.864952 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T02:07:52.865451940Z I0216 02:07:52.865384 1 observer_polling.go:159] Starting file observer 2026-02-16T02:07:52.904424507Z I0216 02:07:52.904383 1 builder.go:304] openshift-apiserver-operator version - 2026-02-16T02:08:23.458092539Z F0216 02:08:23.457953 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock": context deadline exceeded config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-v7lmz.json0000640000000000000000000001605015144476207030330 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-6d4655d9cf-v7lmz","generateName":"openshift-apiserver-operator-6d4655d9cf-","namespace":"openshift-apiserver-operator","uid":"e379cfaf-3a4c-40e7-8641-3524b3669295","resourceVersion":"9269","creationTimestamp":"2026-02-16T02:05:16Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"6d4655d9cf"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.11/23\"],\"mac_address\":\"0a:58:0a:80:00:0b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.11/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.11\"\n ],\n \"mac\": \"0a:58:0a:80:00:0b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-6d4655d9cf","uid":"c9ff6216-27d6-4b59-be8f-db8c4bdefca2","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-gcq6v","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gcq6v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c4"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.11","podIPs":[{"ip":"10.128.0.11"}],"startTime":"2026-02-16T02:06:28Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-02-16T02:09:33Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0216 02:07:52.864772 1 cmd.go:253] Using service-serving-cert provided certificates\nI0216 02:07:52.864952 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 02:07:52.865384 1 observer_polling.go:159] Starting file observer\nI0216 02:07:52.904383 1 builder.go:304] openshift-apiserver-operator version -\nF0216 02:08:23.457953 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-16T02:07:52Z","finishedAt":"2026-02-16T02:08:23Z","containerID":"cri-o://e691a05529b4feda1459fb089aa0bfd36c24c35f07686b8d317ee98a6be4be8a"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","containerID":"cri-o://29588e18b21fc378729e293fc4d3e978d87e6e1444fa9f91d1cf677cd080ce85","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gcq6v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515144476207042722 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-7485d55966-mmhcs2026-02-16T02:09:33.525588417Z I0216 02:09:33.525397 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T02:09:33.525801212Z I0216 02:09:33.525596 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T02:09:33.526477699Z I0216 02:09:33.526446 1 observer_polling.go:159] Starting file observer 2026-02-16T02:09:35.888680679Z I0216 02:09:35.888632 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601180343.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31 2026-02-16T02:09:50.691594502Z I0216 02:09:50.691483 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T02:09:50.691594502Z W0216 02:09:50.691545 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:09:50.691594502Z W0216 02:09:50.691556 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:09:50.691594502Z W0216 02:09:50.691567 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T02:09:50.691594502Z W0216 02:09:50.691575 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T02:09:50.691594502Z W0216 02:09:50.691580 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T02:09:50.691594502Z W0216 02:09:50.691586 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T02:09:50.704960193Z I0216 02:09:50.704898 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T02:09:50.705125648Z I0216 02:09:50.705100 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T02:09:50.705192769Z I0216 02:09:50.705173 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T02:09:50.705307892Z I0216 02:09:50.705281 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T02:09:50.716108150Z I0216 02:09:50.716024 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T02:09:50.716242144Z I0216 02:09:50.716204 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:09:50.716242144Z I0216 02:09:50.716229 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:50.716362147Z I0216 02:09:50.716319 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:09:50.716424008Z I0216 02:09:50.716402 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:50.718307035Z I0216 02:09:50.718266 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T02:09:50.719099424Z I0216 02:09:50.719063 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-02-16T02:09:50.807004686Z I0216 02:09:50.806284 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T02:09:50.816819430Z I0216 02:09:50.816768 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:50.822578523Z I0216 02:09:50.820520 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000004140015144476207043114 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-7485d55966-mmhcs2026-02-16T02:07:29.797061275Z W0216 02:07:29.797026 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-16T02:07:29.797061275Z W0216 02:07:29.797041 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-16T02:07:29.797061275Z W0216 02:07:29.797046 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-16T02:07:29.797061275Z W0216 02:07:29.797050 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-16T02:07:29.797061275Z W0216 02:07:29.797054 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-16T02:07:29.813985895Z I0216 02:07:29.813925 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:41Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:06:57Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:41Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:41Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:41Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:07:29.814126589Z I0216 02:07:29.814088 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:07:29.826096496Z I0216 02:07:29.826037 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"69304b62-58fb-4bfe-969b-2be3aabd65d3", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4" 2026-02-16T02:07:30.982272873Z I0216 02:07:30.982201 1 request.go:700] Waited for 1.167122208s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-4-master-0 2026-02-16T02:07:31.795837586Z I0216 02:07:31.794677 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"69304b62-58fb-4bfe-969b-2be3aabd65d3", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing 2026-02-16T02:07:32.785103429Z I0216 02:07:32.785025 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-02-16T02:07:35.022544864Z I0216 02:07:35.019152 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:07:36.590241254Z I0216 02:07:36.589492 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:07:39.784812665Z I0216 02:07:39.784731 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:07:41.384061508Z I0216 02:07:41.383974 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:07:52.323304403Z I0216 02:07:52.323212 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:07:53.189699408Z I0216 02:07:53.189630 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:08:05.541886052Z I0216 02:08:05.541789 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="861bb0827f4297cd6303e6fa3fc11181d71b4cd2bf9c2ca95b2e45cde63aef85") 2026-02-16T02:08:05.541886052Z W0216 02:08:05.541853 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-02-16T02:08:05.541959664Z I0216 02:08:05.541943 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="bdeed51f7b64519c7a162a46bc8814ec4ff424a0c7ca1df77577cb1c92a29503") 2026-02-16T02:08:05.542195610Z I0216 02:08:05.542127 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-02-16T02:08:05.542195610Z I0216 02:08:05.542161 1 base_controller.go:181] Shutting down RevisionController ... 2026-02-16T02:08:05.542310533Z I0216 02:08:05.542271 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-02-16T02:08:05.542310533Z I0216 02:08:05.542294 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-02-16T02:08:05.542310533Z I0216 02:08:05.542304 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-02-16T02:08:05.542342804Z I0216 02:08:05.542297 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-02-16T02:08:05.542342804Z I0216 02:08:05.542326 1 base_controller.go:181] Shutting down GuardController ... 2026-02-16T02:08:05.542342804Z I0216 02:08:05.542335 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-02-16T02:08:05.542360974Z I0216 02:08:05.542341 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-02-16T02:08:05.542360974Z I0216 02:08:05.542316 1 base_controller.go:181] Shutting down Installer ... 2026-02-16T02:08:05.542360974Z I0216 02:08:05.542354 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-02-16T02:08:05.542382145Z I0216 02:08:05.542371 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-02-16T02:08:05.542400435Z I0216 02:08:05.542373 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-02-16T02:08:05.542400435Z I0216 02:08:05.542386 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-02-16T02:08:05.542420126Z I0216 02:08:05.542398 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-02-16T02:08:05.542420126Z I0216 02:08:05.542392 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-02-16T02:08:05.542420126Z I0216 02:08:05.542415 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-02-16T02:08:05.542466747Z I0216 02:08:05.542424 1 base_controller.go:113] All Installer workers have been terminated 2026-02-16T02:08:05.542489197Z I0216 02:08:05.542430 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-02-16T02:08:05.542489197Z I0216 02:08:05.542469 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-02-16T02:08:05.542489197Z I0216 02:08:05.542459 1 controller_manager.go:54] Installer controller terminated 2026-02-16T02:08:05.542489197Z I0216 02:08:05.542464 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-02-16T02:08:05.542489197Z I0216 02:08:05.542483 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-02-16T02:08:05.542522998Z I0216 02:08:05.542484 1 base_controller.go:113] All GuardController workers have been terminated 2026-02-16T02:08:05.542522998Z I0216 02:08:05.542497 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-02-16T02:08:05.542522998Z I0216 02:08:05.542510 1 controller_manager.go:54] GuardController controller terminated 2026-02-16T02:08:05.542522998Z I0216 02:08:05.542512 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-16T02:08:05.542541189Z I0216 02:08:05.542519 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-02-16T02:08:05.542541189Z I0216 02:08:05.542531 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-02-16T02:08:05.542557739Z I0216 02:08:05.542532 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-02-16T02:08:05.542573249Z I0216 02:08:05.542549 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-02-16T02:08:05.542573249Z I0216 02:08:05.542559 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-02-16T02:08:05.542573249Z I0216 02:08:05.542563 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-02-16T02:08:05.542590040Z I0216 02:08:05.542573 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-16T02:08:05.542590040Z I0216 02:08:05.542579 1 base_controller.go:181] Shutting down PruneController ... 2026-02-16T02:08:05.542605960Z I0216 02:08:05.542589 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-02-16T02:08:05.542605960Z I0216 02:08:05.542594 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-02-16T02:08:05.542621901Z I0216 02:08:05.542605 1 base_controller.go:113] All RevisionController workers have been terminated 2026-02-16T02:08:05.542621901Z I0216 02:08:05.542613 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:08:05.542641531Z I0216 02:08:05.542630 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-02-16T02:08:05.542641531Z I0216 02:08:05.542632 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-02-16T02:08:05.542688212Z I0216 02:08:05.542652 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-02-16T02:08:05.542688212Z I0216 02:08:05.542668 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-02-16T02:08:05.542688212Z I0216 02:08:05.542680 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-02-16T02:08:05.542706083Z I0216 02:08:05.542492 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-02-16T02:08:05.542706083Z I0216 02:08:05.542694 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2171727022/tls.crt::/tmp/serving-cert-2171727022/tls.key" 2026-02-16T02:08:05.542727213Z I0216 02:08:05.542705 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-02-16T02:08:05.542727213Z I0216 02:08:05.542716 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-02-16T02:08:05.542743494Z I0216 02:08:05.542725 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-02-16T02:08:05.542743494Z I0216 02:08:05.542551 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-02-16T02:08:05.542743494Z I0216 02:08:05.542734 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-02-16T02:08:05.542743494Z I0216 02:08:05.542738 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-02-16T02:08:05.542762024Z I0216 02:08:05.542740 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-02-16T02:08:05.542762024Z I0216 02:08:05.542748 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-02-16T02:08:05.542762024Z I0216 02:08:05.542742 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-02-16T02:08:05.542762024Z I0216 02:08:05.542750 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-02-16T02:08:05.542780075Z I0216 02:08:05.542765 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-02-16T02:08:05.542780075Z I0216 02:08:05.542615 1 controller_manager.go:54] RevisionController controller terminated 2026-02-16T02:08:05.542796465Z I0216 02:08:05.542605 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:08:05.542796465Z I0216 02:08:05.542783 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-02-16T02:08:05.542796465Z I0216 02:08:05.542763 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-02-16T02:08:05.542813655Z I0216 02:08:05.542795 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-02-16T02:08:05.542813655Z I0216 02:08:05.542697 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-02-16T02:08:05.542829416Z I0216 02:08:05.542766 1 base_controller.go:113] All PruneController workers have been terminated 2026-02-16T02:08:05.542829416Z I0216 02:08:05.542820 1 controller_manager.go:54] PruneController controller terminated 2026-02-16T02:08:05.542845276Z I0216 02:08:05.542833 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-02-16T02:08:05.542860547Z I0216 02:08:05.542837 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-02-16T02:08:05.542875977Z I0216 02:08:05.542856 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-02-16T02:08:05.542875977Z I0216 02:08:05.542842 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-02-16T02:08:05.542875977Z I0216 02:08:05.542519 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-02-16T02:08:05.542898818Z I0216 02:08:05.542872 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-02-16T02:08:05.542898818Z I0216 02:08:05.542878 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-02-16T02:08:05.542898818Z I0216 02:08:05.542887 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-02-16T02:08:05.542898818Z I0216 02:08:05.542867 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-02-16T02:08:05.542916598Z I0216 02:08:05.542906 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-02-16T02:08:05.542975999Z I0216 02:08:05.542947 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-02-16T02:08:05.542975999Z I0216 02:08:05.542967 1 builder.go:335] server exited 2026-02-16T02:08:10.542130910Z I0216 02:08:10.542040 1 observer_polling.go:162] Shutting down file observer 2026-02-16T02:08:39.547171778Z E0216 02:08:39.546906 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-16T02:08:39.547171778Z W0216 02:08:39.546955 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-mmhcs.json0000640000000000000000000001365715144476207031765 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-7485d55966-mmhcs","generateName":"openshift-kube-scheduler-operator-7485d55966-","namespace":"openshift-kube-scheduler-operator","uid":"1743372f-bdb0-4558-b47b-3714f3aa3fde","resourceVersion":"9272","creationTimestamp":"2026-02-16T02:05:17Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"7485d55966"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.24/23\"],\"mac_address\":\"0a:58:0a:80:00:18\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.24/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.24\"\n ],\n \"mac\": \"0a:58:0a:80:00:18\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-7485d55966","uid":"66f7b24c-2d09-412f-b9ce-de5723b13fcb","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.24","podIPs":[{"ip":"10.128.0.24"}],"startTime":"2026-02-16T02:06:28Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-02-16T02:09:33Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T02:06:40Z","finishedAt":"2026-02-16T02:08:39Z","containerID":"cri-o://1f742ab76573db69bc143df83fcf581f4c09f3de9ec005f01809b1af5690b4d3"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","containerID":"cri-o://0dc42258a91591e663cff6bfadf2f4cf0cbbf5b87ca16464ed15e85bd5889c2f","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-4-master-0/installer_current.log0000640000000000000000000001513615144476207027200 0ustar00000000000000002026-02-16T02:07:33.536989111Z I0216 02:07:33.535790 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000b6b180 cert-secrets:0xc000b6af00 configmaps:0xc000b6aaa0 namespace:0xc000b6a8c0 optional-configmaps:0xc000b6abe0 optional-secrets:0xc000b6ab40 pod:0xc000b6a960 pod-manifest-dir:0xc000b6ad20 resource-dir:0xc000b6ac80 revision:0xc000b6a820 secrets:0xc000b6aa00 v:0xc000b6bb80] [0xc000b6bb80 0xc000b6a820 0xc000b6a8c0 0xc000b6a960 0xc000b6ac80 0xc000b6ad20 0xc000b6aaa0 0xc000b6abe0 0xc000b6ab40 0xc000b6aa00 0xc000b6b180 0xc000b6af00] [] map[cert-configmaps:0xc000b6afa0 cert-dir:0xc000b6b180 cert-secrets:0xc000b6af00 configmaps:0xc000b6aaa0 help:0xc000b7e000 kubeconfig:0xc000b6a780 log-flush-frequency:0xc000b6bae0 namespace:0xc000b6a8c0 optional-cert-configmaps:0xc000b6b0e0 optional-cert-secrets:0xc000b6b040 optional-configmaps:0xc000b6abe0 optional-secrets:0xc000b6ab40 pod:0xc000b6a960 pod-manifest-dir:0xc000b6ad20 pod-manifests-lock-file:0xc000b6ae60 resource-dir:0xc000b6ac80 revision:0xc000b6a820 secrets:0xc000b6aa00 timeout-duration:0xc000b6adc0 v:0xc000b6bb80 vmodule:0xc000b6bc20] [0xc000b6a780 0xc000b6a820 0xc000b6a8c0 0xc000b6a960 0xc000b6aa00 0xc000b6aaa0 0xc000b6ab40 0xc000b6abe0 0xc000b6ac80 0xc000b6ad20 0xc000b6adc0 0xc000b6ae60 0xc000b6af00 0xc000b6afa0 0xc000b6b040 0xc000b6b0e0 0xc000b6b180 0xc000b6bae0 0xc000b6bb80 0xc000b6bc20 0xc000b7e000] [0xc000b6afa0 0xc000b6b180 0xc000b6af00 0xc000b6aaa0 0xc000b7e000 0xc000b6a780 0xc000b6bae0 0xc000b6a8c0 0xc000b6b0e0 0xc000b6b040 0xc000b6abe0 0xc000b6ab40 0xc000b6a960 0xc000b6ad20 0xc000b6ae60 0xc000b6ac80 0xc000b6a820 0xc000b6aa00 0xc000b6adc0 0xc000b6bb80 0xc000b6bc20] map[104:0xc000b7e000 118:0xc000b6bb80] [] -1 0 0xc000b316e0 true 0x223d5a0 []} 2026-02-16T02:07:33.536989111Z I0216 02:07:33.536044 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000b0c4e0)({ 2026-02-16T02:07:33.536989111Z KubeConfig: (string) "", 2026-02-16T02:07:33.536989111Z KubeClient: (kubernetes.Interface) , 2026-02-16T02:07:33.536989111Z Revision: (string) (len=1) "4", 2026-02-16T02:07:33.536989111Z NodeName: (string) "", 2026-02-16T02:07:33.536989111Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-02-16T02:07:33.536989111Z Clock: (clock.RealClock) { 2026-02-16T02:07:33.536989111Z }, 2026-02-16T02:07:33.536989111Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-02-16T02:07:33.536989111Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T02:07:33.536989111Z (string) (len=31) "localhost-recovery-client-token" 2026-02-16T02:07:33.536989111Z }, 2026-02-16T02:07:33.536989111Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T02:07:33.536989111Z (string) (len=12) "serving-cert" 2026-02-16T02:07:33.536989111Z }, 2026-02-16T02:07:33.536989111Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-16T02:07:33.536989111Z (string) (len=18) "kube-scheduler-pod", 2026-02-16T02:07:33.536989111Z (string) (len=6) "config", 2026-02-16T02:07:33.536989111Z (string) (len=17) "serviceaccount-ca", 2026-02-16T02:07:33.536989111Z (string) (len=20) "scheduler-kubeconfig", 2026-02-16T02:07:33.536989111Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-16T02:07:33.536989111Z }, 2026-02-16T02:07:33.536989111Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T02:07:33.536989111Z (string) (len=16) "policy-configmap" 2026-02-16T02:07:33.536989111Z }, 2026-02-16T02:07:33.536989111Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-16T02:07:33.536989111Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-16T02:07:33.536989111Z }, 2026-02-16T02:07:33.536989111Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-16T02:07:33.536989111Z CertConfigMapNamePrefixes: ([]string) , 2026-02-16T02:07:33.536989111Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-16T02:07:33.536989111Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-16T02:07:33.536989111Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-16T02:07:33.536989111Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-16T02:07:33.536989111Z Timeout: (time.Duration) 2m0s, 2026-02-16T02:07:33.536989111Z StaticPodManifestsLockFile: (string) "", 2026-02-16T02:07:33.536989111Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-16T02:07:33.536989111Z KubeletVersion: (string) "" 2026-02-16T02:07:33.536989111Z }) 2026-02-16T02:07:33.628486252Z I0216 02:07:33.537568 1 cmd.go:413] Getting controller reference for node master-0 2026-02-16T02:07:33.628486252Z I0216 02:07:33.547315 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-16T02:07:33.628486252Z I0216 02:07:33.547385 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T02:07:33.628486252Z I0216 02:07:33.547396 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T02:07:33.631225280Z I0216 02:07:33.631172 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-02-16T02:07:43.804875023Z I0216 02:07:43.804125 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-02-16T02:08:07.633614790Z W0216 02:08:07.633518 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T02:08:27.634877089Z W0216 02:08:27.634706 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T02:08:47.634991211Z W0216 02:08:47.634836 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T02:09:01.638527694Z W0216 02:09:01.638346 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T02:09:01.638652287Z F0216 02:09:01.638415 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-scheduler/installer-4-master-0.json0000640000000000000000000001632515144476207022666 0ustar0000000000000000{"metadata":{"name":"installer-4-master-0","namespace":"openshift-kube-scheduler","uid":"8ea4c28c-8f53-4b41-9c85-c8c50599d7cd","resourceVersion":"9267","creationTimestamp":"2026-02-16T02:07:31Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.54/23\"],\"mac_address\":\"0a:58:0a:80:00:36\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.54/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.54\"\n ],\n \"mac\": \"0a:58:0a:80:00:36\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-4","uid":"2797e795-3eca-4f4b-9bb7-bdbe3244743b"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=4","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:33Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:31Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:32Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:32Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:31Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.54","podIPs":[{"ip":"10.128.0.54"}],"startTime":"2026-02-16T02:07:31Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0216 02:07:33.537568 1 cmd.go:413] Getting controller reference for node master-0\nI0216 02:07:33.547315 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0216 02:07:33.547385 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 02:07:33.547396 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 02:07:33.631172 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0216 02:07:43.804125 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0216 02:08:07.633518 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0216 02:08:27.634706 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0216 02:08:47.634836 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0216 02:09:01.638346 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0216 02:09:01.638415 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-02-16T02:07:32Z","finishedAt":"2026-02-16T02:09:01Z","containerID":"cri-o://bb9ffb6ca918ba3341c8df0e7c8c8ba7325d86a68eb6b2856270c9f7326551b5"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","containerID":"cri-o://bb9ffb6ca918ba3341c8df0e7c8c8ba7325d86a68eb6b2856270c9f7326551b5","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000003372315144476207030237 0ustar00000000000000002026-02-16T02:09:11.739097256Z filter: {} 2026-02-16T02:09:11.739097256Z multiPoint: 2026-02-16T02:09:11.739097256Z enabled: 2026-02-16T02:09:11.739097256Z - name: SchedulingGates 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: PrioritySort 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: NodeUnschedulable 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: NodeName 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: TaintToleration 2026-02-16T02:09:11.739097256Z weight: 3 2026-02-16T02:09:11.739097256Z - name: NodeAffinity 2026-02-16T02:09:11.739097256Z weight: 2 2026-02-16T02:09:11.739097256Z - name: NodePorts 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: NodeResourcesFit 2026-02-16T02:09:11.739097256Z weight: 1 2026-02-16T02:09:11.739097256Z - name: VolumeRestrictions 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: NodeVolumeLimits 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: VolumeBinding 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: VolumeZone 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: PodTopologySpread 2026-02-16T02:09:11.739097256Z weight: 2 2026-02-16T02:09:11.739097256Z - name: InterPodAffinity 2026-02-16T02:09:11.739097256Z weight: 2 2026-02-16T02:09:11.739097256Z - name: DefaultPreemption 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z - name: NodeResourcesBalancedAllocation 2026-02-16T02:09:11.739097256Z weight: 1 2026-02-16T02:09:11.739097256Z - name: ImageLocality 2026-02-16T02:09:11.739097256Z weight: 1 2026-02-16T02:09:11.739097256Z - name: DefaultBinder 2026-02-16T02:09:11.739097256Z weight: 0 2026-02-16T02:09:11.739097256Z permit: {} 2026-02-16T02:09:11.739097256Z postBind: {} 2026-02-16T02:09:11.739097256Z postFilter: {} 2026-02-16T02:09:11.739097256Z preBind: {} 2026-02-16T02:09:11.739097256Z preEnqueue: {} 2026-02-16T02:09:11.739097256Z preFilter: {} 2026-02-16T02:09:11.739097256Z preScore: {} 2026-02-16T02:09:11.739097256Z queueSort: {} 2026-02-16T02:09:11.739097256Z reserve: {} 2026-02-16T02:09:11.739097256Z score: {} 2026-02-16T02:09:11.739097256Z schedulerName: default-scheduler 2026-02-16T02:09:11.739097256Z > 2026-02-16T02:09:11.742138092Z I0216 02:09:11.742092 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-02-16T02:09:11.742218044Z I0216 02:09:11.742195 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-02-16T02:09:11.746646584Z I0216 02:09:11.746556 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:09:11.746746546Z I0216 02:09:11.746695 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:11.747078494Z I0216 02:09:11.747006 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-02-16T02:09:11.747349721Z I0216 02:09:11.747306 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771207691\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771207691\" (2026-02-16 01:08:10 +0000 UTC to 2027-02-16 01:08:10 +0000 UTC (now=2026-02-16 02:09:11.747189767 +0000 UTC))" 2026-02-16T02:09:11.747724850Z I0216 02:09:11.747654 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207691\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207691\" (2026-02-16 01:08:11 +0000 UTC to 2029-02-16 01:08:11 +0000 UTC (now=2026-02-16 02:09:11.747620578 +0000 UTC))" 2026-02-16T02:09:11.748196262Z I0216 02:09:11.748164 1 secure_serving.go:213] Serving securely on [::]:10259 2026-02-16T02:09:11.748341126Z I0216 02:09:11.748289 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T02:09:11.752024277Z I0216 02:09:11.751950 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.752068218Z I0216 02:09:11.752022 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.752610402Z I0216 02:09:11.752537 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-02-16T02:09:11.753754700Z I0216 02:09:11.753701 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.754018796Z I0216 02:09:11.753938 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.757306818Z I0216 02:09:11.757245 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.757569765Z I0216 02:09:11.757512 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.757659137Z I0216 02:09:11.757582 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.758283372Z I0216 02:09:11.758232 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.758729103Z I0216 02:09:11.758671 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.759151634Z I0216 02:09:11.759069 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.761881012Z I0216 02:09:11.761803 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.762401125Z I0216 02:09:11.762285 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-02-16T02:09:11.765177383Z I0216 02:09:11.765102 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.766152248Z I0216 02:09:11.766084 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.789147728Z I0216 02:09:11.788997 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.792997504Z I0216 02:09:11.792941 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-02-16T02:09:11.847470546Z I0216 02:09:11.847355 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:11.848073081Z I0216 02:09:11.847997 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 01:50:24 +0000 UTC to 2036-02-14 01:50:24 +0000 UTC (now=2026-02-16 02:09:11.847961288 +0000 UTC))" 2026-02-16T02:09:11.848092271Z I0216 02:09:11.848057 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2026-02-17 01:56:50 +0000 UTC (now=2026-02-16 02:09:11.84804496 +0000 UTC))" 2026-02-16T02:09:11.848108982Z I0216 02:09:11.848089 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2027-02-16 01:56:50 +0000 UTC (now=2026-02-16 02:09:11.848077771 +0000 UTC))" 2026-02-16T02:09:11.848157733Z I0216 02:09:11.848115 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2027-02-16 01:56:50 +0000 UTC (now=2026-02-16 02:09:11.848104732 +0000 UTC))" 2026-02-16T02:09:11.848174614Z I0216 02:09:11.848146 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2036-02-14 01:56:48 +0000 UTC (now=2026-02-16 02:09:11.848136563 +0000 UTC))" 2026-02-16T02:09:11.848525342Z I0216 02:09:11.848466 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771207691\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771207691\" (2026-02-16 01:08:10 +0000 UTC to 2027-02-16 01:08:10 +0000 UTC (now=2026-02-16 02:09:11.84841836 +0000 UTC))" 2026-02-16T02:09:11.848816779Z I0216 02:09:11.848763 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207691\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207691\" (2026-02-16 01:08:11 +0000 UTC to 2029-02-16 01:08:11 +0000 UTC (now=2026-02-16 02:09:11.848745868 +0000 UTC))" 2026-02-16T02:09:11.849031955Z I0216 02:09:11.848775 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-02-16T02:09:16.851051806Z E0216 02:09:16.850940 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T02:09:24.812239786Z E0216 02:09:24.811730 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T02:09:32.462766667Z E0216 02:09:32.460925 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io kube-scheduler) 2026-02-16T02:09:58.001175308Z I0216 02:09:58.001071 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-02-16T02:09:58.003234059Z I0216 02:09:58.003144 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-864ddd5f56-ffptx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-16T02:09:58.003589578Z I0216 02:09:58.003514 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-695b766898-9dx2k" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-16T02:09:58.003863234Z I0216 02:09:58.003795 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7d8f4c8c66-kcnkd" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-16T02:09:58.013368790Z I0216 02:09:58.013277 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5788fc6459-29m25" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:09:58.018510268Z I0216 02:09:58.018398 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-998bd8b4b-hm5k2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:09:58.018571469Z I0216 02:09:58.018518 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-6796f86fd6-qtxkl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:10:00.817838598Z I0216 02:10:00.817746 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-gkbtj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:10:00.825430916Z I0216 02:10:00.823739 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-9c6g5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:10:03.373927740Z I0216 02:10:03.373237 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-s95k9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:10:03.567509785Z I0216 02:10:03.567228 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-thm6w" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006427015144476207030432 0ustar00000000000000002026-02-16T02:05:44.959507233Z I0216 02:05:44.959337 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-bb7ffbb8d-mcff9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:05:45.176496208Z I0216 02:05:45.175475 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-zmw46" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:05:47.142026492Z I0216 02:05:47.141617 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7d8f4c8c66-kcnkd" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-16T02:05:48.141857763Z I0216 02:05:48.141765 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-hswdj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:05:52.824722770Z I0216 02:05:52.824335 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-kffmg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:15.678522000Z I0216 02:06:15.677022 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-bs85n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.691082503Z I0216 02:06:28.690998 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-588944557d-2z8fq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.725245855Z I0216 02:06:28.725171 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-7b87b97578-8n9v4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.748699640Z I0216 02:06:28.748218 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-nbjz6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.748699640Z I0216 02:06:28.748639 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-6cc5b65c6b-8nl7s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.750099994Z I0216 02:06:28.748936 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-cd5474998-x2sh4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.750099994Z I0216 02:06:28.749296 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-6b56bd877c-qwp9g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.750099994Z I0216 02:06:28.749752 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-755d954778-bngv9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.754756031Z I0216 02:06:28.750158 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-7c6bdb986f-zlbd2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.754756031Z I0216 02:06:28.750563 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-dsjz2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.754756031Z I0216 02:06:28.750940 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-v7lmz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.754756031Z I0216 02:06:28.753072 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-mmhcs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.754756031Z I0216 02:06:28.753607 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-96c8c64b8-bxgpd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.754756031Z I0216 02:06:28.753650 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-86b8869b79-4rfwq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.754819292Z I0216 02:06:28.754757 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-7c64d55f8-62wr2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.754819292Z I0216 02:06:28.754790 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48-jshtp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.755366606Z I0216 02:06:28.754849 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-ff6c9b66-845gn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.755366606Z I0216 02:06:28.754925 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-tkqng" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.755366606Z I0216 02:06:28.755054 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d-b47jp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.755366606Z I0216 02:06:28.755254 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-dgxhp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.755545880Z I0216 02:06:28.755472 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-67bf55ccdd-htjgz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.755651723Z I0216 02:06:28.755589 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-756d64c8c4-5q4zs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.756178706Z I0216 02:06:28.756099 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-5dc4688546-ck5nr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:28.977148927Z I0216 02:06:28.976189 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-9bnql" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:42.088549353Z I0216 02:06:42.087849 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-dc99ff586-t5hvw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:42.350974768Z I0216 02:06:42.349426 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-5bd989df77-sh2wj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:43.283277719Z I0216 02:06:43.282147 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-676cd8b9b5-x6nhn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:43.410017080Z I0216 02:06:43.409906 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-dc665b75-6qzmt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:43.430254564Z I0216 02:06:43.430143 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-58bf558d4c-xx8rm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:06:45.076361208Z E0216 02:06:45.075393 1 framework.go:1305] "Plugin Failed" err="Operation cannot be fulfilled on pods/binding \"controller-manager-58bf558d4c-xx8rm\": pod controller-manager-58bf558d4c-xx8rm is being deleted, cannot be assigned to a host" plugin="DefaultBinder" pod="openshift-controller-manager/controller-manager-58bf558d4c-xx8rm" node="master-0" 2026-02-16T02:06:45.076361208Z I0216 02:06:45.075463 1 schedule_one.go:1004] "Failed to bind pod" pod="openshift-controller-manager/controller-manager-58bf558d4c-xx8rm" 2026-02-16T02:06:45.076361208Z E0216 02:06:45.075501 1 schedule_one.go:1057] "Error scheduling pod; retrying" err="running Bind plugin \"DefaultBinder\": Operation cannot be fulfilled on pods/binding \"controller-manager-58bf558d4c-xx8rm\": pod controller-manager-58bf558d4c-xx8rm is being deleted, cannot be assigned to a host" pod="openshift-controller-manager/controller-manager-58bf558d4c-xx8rm" 2026-02-16T02:06:45.076361208Z I0216 02:06:45.075521 1 schedule_one.go:1064] "Pod doesn't exist in informer cache" pod="openshift-controller-manager/controller-manager-58bf558d4c-xx8rm" err="pod \"controller-manager-58bf558d4c-xx8rm\" not found" 2026-02-16T02:06:45.088706376Z E0216 02:06:45.088115 1 schedule_one.go:1106] "Error updating pod" err="pods \"controller-manager-58bf558d4c-xx8rm\" not found" pod="openshift-controller-manager/controller-manager-58bf558d4c-xx8rm" 2026-02-16T02:06:45.120241233Z I0216 02:06:45.119111 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6dc6c44bd6-rj7sr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:52.631027220Z I0216 02:06:52.629866 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-996fc886d-zb7x5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:54.574790367Z I0216 02:06:54.573766 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-74b6595c6d-466x9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:06:57.879104801Z I0216 02:06:57.878981 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-7b55c578b7-cvwml" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:06:59.144465698Z I0216 02:06:59.144351 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-7b55c578b7-cvwml" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:01.235510308Z I0216 02:07:01.233911 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6b5857dcf-vw8hp" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:01.278008253Z I0216 02:07:01.277170 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-8b946f9d6-8xg2l" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:02.773709217Z I0216 02:07:02.773611 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-vvw25" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:03.865153357Z I0216 02:07:03.865034 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6b5857dcf-vw8hp" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:04.197233468Z I0216 02:07:04.197059 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-8b946f9d6-8xg2l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:06.401033668Z I0216 02:07:06.397497 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-67f79f9544-nhm26" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:06.526166954Z I0216 02:07:06.525217 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-67bc7c997f-zc2br" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:06.595478564Z I0216 02:07:06.591941 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-85c9b89969-g9lcm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:06.674009804Z I0216 02:07:06.673952 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6b5857dcf-vw8hp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:06.814330186Z I0216 02:07:06.814024 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-njlg6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:06.917966099Z I0216 02:07:06.917901 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-747969bcdd-dth9n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:07.003007579Z I0216 02:07:07.001687 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-864ddd5f56-ffptx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-16T02:07:07.299703263Z I0216 02:07:07.299576 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-7tjn9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:07.431264199Z I0216 02:07:07.431191 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-67f79f9544-nhm26" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:08.437483743Z I0216 02:07:08.437185 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-578b9bc556-8g98v" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:12.665940915Z I0216 02:07:12.662971 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-6796f86fd6-qtxkl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:20.893479215Z I0216 02:07:20.893320 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-578b9bc556-8g98v" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:20.894517561Z I0216 02:07:20.893958 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-6796f86fd6-qtxkl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:21.298324024Z I0216 02:07:21.298071 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5574f479df-xqnpg" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:21.402446558Z I0216 02:07:21.401425 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-696cfb9f87-87b8w" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:21.557868286Z I0216 02:07:21.557789 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-649c4f5445-lzvc4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:21.703285985Z I0216 02:07:21.703001 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-695b766898-9dx2k" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-16T02:07:22.135806040Z I0216 02:07:22.135729 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-9kb98" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:22.447361513Z I0216 02:07:22.447079 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5574f479df-xqnpg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:22.447635289Z I0216 02:07:22.447594 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-696cfb9f87-87b8w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:22.903512585Z I0216 02:07:22.901069 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-vkp55" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:23.939145380Z I0216 02:07:23.939088 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-578b9bc556-8g98v" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:23.939734284Z I0216 02:07:23.939698 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-6796f86fd6-qtxkl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:24.695894243Z I0216 02:07:24.695716 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-trqk8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:25.296203793Z I0216 02:07:25.296014 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-9qtbw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:27.941472759Z I0216 02:07:27.941402 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-6796f86fd6-qtxkl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:28.042732782Z I0216 02:07:28.042670 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-578b9bc556-8g98v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:35.945727207Z I0216 02:07:35.945668 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-6796f86fd6-qtxkl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:36.069079399Z I0216 02:07:36.069012 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-d8bf84b88-r5l9f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:39.371405594Z I0216 02:07:39.370657 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-6c46d95f74-j4xhj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:43.120371244Z I0216 02:07:43.118912 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-595c8f9ff-n8xmg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:44.717573537Z I0216 02:07:44.710696 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-f8cbff74c-k8jz5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:44.837870133Z I0216 02:07:44.837401 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-7bc947fc7d-frvgm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:46.356935907Z I0216 02:07:46.355697 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-67fd9768b5-9rvcj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:46.457310218Z I0216 02:07:46.455748 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5788fc6459-29m25" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:46.681520313Z I0216 02:07:46.676496 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96-qm7rm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:46.681520313Z I0216 02:07:46.677488 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-cb4f7b4cf-llpf5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:46.991990919Z I0216 02:07:46.988873 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-998bd8b4b-hm5k2" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:48.155001405Z I0216 02:07:48.152231 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-84976bb859-5gs6g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:48.315168090Z I0216 02:07:48.314336 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-5b487c8bfc-s52cg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:48.722827418Z I0216 02:07:48.722132 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-bd7dd5c46-qw2zq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:48.791348789Z I0216 02:07:48.791040 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-87777c9b7-fxzh6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-16T02:07:52.345989237Z I0216 02:07:52.309689 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-6796f86fd6-qtxkl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:52.345989237Z I0216 02:07:52.310317 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5788fc6459-29m25" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:07:52.345989237Z I0216 02:07:52.311521 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-998bd8b4b-hm5k2" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:08:00.043888021Z E0216 02:08:00.043735 1 leaderelection.go:429] Failed to update lock optimitically: the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io kube-scheduler), falling back to slow path 2026-02-16T02:08:02.964215244Z I0216 02:08:02.964089 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-oauth-apiserver/apiserver-6796f86fd6-qtxkl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-16T02:08:05.043408720Z E0216 02:08:05.042727 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-02-16T02:08:05.043408720Z I0216 02:08:05.042788 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-02-16T02:08:10.043408962Z E0216 02:08:10.043305 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T02:08:10.043516225Z E0216 02:08:10.043398 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515144476207023016 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"9c06fa42-1420-4b69-9bf4-8a782a5e3fd2","resourceVersion":"9229","creationTimestamp":"2026-02-16T02:06:21Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"9460ca0802075a8a6a10d7b3e6052c4d","kubernetes.io/config.mirror":"9460ca0802075a8a6a10d7b3e6052c4d","kubernetes.io/config.seen":"2026-02-16T02:04:41.996616785Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c26f8467-b1c8-4080-ab76-7bbfaa57ed70","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:08:11Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:08:11Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T02:06:37Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-02-16T02:08:10Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-16T02:04:51Z","finishedAt":"2026-02-16T02:08:10Z","containerID":"cri-o://0d84c00dcc11900a2f5a4ff15f798ef8c8b6cc92a9b7e1f32a7c33bfeed4a478"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","containerID":"cri-o://1bad524fd514e3639a6a8b060873c8398b9f534aa2528726df9aa2897827465b","started":true}],"qosClass":"Burstable"}}config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002734715144476207024641 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"8825afde-4071-436d-b023-ebc48932b8b2","resourceVersion":"9410","creationTimestamp":"2026-02-16T02:06:22Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"80420f2e7c3cdda71f7d0d6ccbe6f9f3","kubernetes.io/config.mirror":"80420f2e7c3cdda71f7d0d6ccbe6f9f3","kubernetes.io/config.seen":"2026-02-16T02:04:41.996609805Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c26f8467-b1c8-4080-ab76-7bbfaa57ed70","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:51Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:51Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T02:06:37Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-02-16T02:04:53Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","containerID":"cri-o://7921033cca2163ce5e4549f18d23b23e3797f9935bb1bd7ed5580d96e9031f08","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-02-16T02:09:33Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-16T02:08:07Z","finishedAt":"2026-02-16T02:09:08Z","containerID":"cri-o://f7e5042e1717f873aa5ed64ccd2f2b11417f41ea4156f1f41e924e94dbf23445"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","containerID":"cri-o://faf5128620c105dbf4c0b83460e5c6d63ea7e16d1417f90a62c09817a9c5e166","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000013452315144476207044445 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-78ff47c7c5-dgxhp2026-02-16T02:07:47.246607298Z NodeName: (string) (len=8) "master-0", 2026-02-16T02:07:47.246607298Z CurrentRevision: (int32) 0, 2026-02-16T02:07:47.246607298Z TargetRevision: (int32) 2, 2026-02-16T02:07:47.246607298Z LastFailedRevision: (int32) 0, 2026-02-16T02:07:47.246607298Z LastFailedTime: (*v1.Time)(), 2026-02-16T02:07:47.246607298Z LastFailedReason: (string) "", 2026-02-16T02:07:47.246607298Z LastFailedCount: (int) 0, 2026-02-16T02:07:47.246607298Z LastFallbackCount: (int) 0, 2026-02-16T02:07:47.246607298Z LastFailedRevisionErrors: ([]string) 2026-02-16T02:07:47.246607298Z } 2026-02-16T02:07:47.246607298Z because new revision pending 2026-02-16T02:07:47.253571901Z W0216 02:07:47.249963 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-16T02:07:47.253571901Z W0216 02:07:47.249998 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-16T02:07:47.253571901Z W0216 02:07:47.250009 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-16T02:07:47.253571901Z W0216 02:07:47.250018 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-16T02:07:47.253571901Z W0216 02:07:47.250026 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-16T02:07:47.384742836Z I0216 02:07:47.384641 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:07:29Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:07:47.385288350Z I0216 02:07:47.385046 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:07:47.667041803Z I0216 02:07:47.666683 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2" 2026-02-16T02:07:49.385353343Z I0216 02:07:49.385279 1 request.go:700] Waited for 1.181199528s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/default/endpoints/kubernetes 2026-02-16T02:07:49.392971082Z E0216 02:07:49.392924 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:07:49.393324081Z I0216 02:07:49.393293 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:07:49.595725134Z I0216 02:07:49.595644 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing 2026-02-16T02:07:50.388407649Z I0216 02:07:50.388317 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-02-16T02:07:50.787501204Z I0216 02:07:50.786646 1 request.go:700] Waited for 1.191005221s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/kube-controller-manager-master-0 2026-02-16T02:07:51.983607972Z I0216 02:07:51.983507 1 request.go:700] Waited for 1.185778772s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/kube-controller-manager-master-0 2026-02-16T02:07:52.588128817Z I0216 02:07:52.588067 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-02-16T02:07:53.984884845Z I0216 02:07:53.984832 1 request.go:700] Waited for 1.188388156s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller 2026-02-16T02:08:53.986310583Z E0216 02:08:53.986252 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get pods)" 2026-02-16T02:09:26.180014075Z E0216 02:09:26.179911 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-16T02:09:27.796194869Z E0216 02:09:27.796090 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-StaticPodState\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-16T02:09:28.189526982Z E0216 02:09:28.189328 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-16T02:09:45.030046191Z I0216 02:09:45.029948 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:09:45.046190342Z I0216 02:09:45.046112 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:09:49.591128067Z I0216 02:09:49.588520 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:09:49.591128067Z E0216 02:09:49.588722 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:09:50.775046713Z E0216 02:09:50.774992 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded]" 2026-02-16T02:09:50.782056387Z I0216 02:09:50.779202 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:09:50.782056387Z I0216 02:09:50.779304 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:07:29Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:09:50.803127160Z E0216 02:09:50.799195 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:09:50.803127160Z I0216 02:09:50.799224 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:09:50.803127160Z I0216 02:09:50.800700 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: " 2026-02-16T02:09:50.824022959Z E0216 02:09:50.823474 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)" 2026-02-16T02:09:50.830674174Z I0216 02:09:50.828518 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:09:50.830674174Z I0216 02:09:50.829275 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"NodeControllerDegraded: All master nodes are ready\nBackingResourceControllerDegraded: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\nBackingResourceControllerDegraded: \nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:07:29Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:09:50.841554984Z I0216 02:09:50.840794 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: " to "NodeControllerDegraded: All master nodes are ready\nBackingResourceControllerDegraded: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\nBackingResourceControllerDegraded: \nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: " 2026-02-16T02:09:51.491074705Z W0216 02:09:51.490961 1 dynamic_operator_client.go:355] .status.conditions["BackingResourceControllerDegraded"].message is missing; this will eventually be fatal 2026-02-16T02:09:51.528033632Z I0216 02:09:51.527949 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:09:51.531224462Z I0216 02:09:51.531140 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:07:29Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:09:51.552232093Z I0216 02:09:51.550122 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nBackingResourceControllerDegraded: \"manifests/installer-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\nBackingResourceControllerDegraded: \nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: " to "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: " 2026-02-16T02:09:52.276718725Z I0216 02:09:52.276550 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:09:52.276963791Z E0216 02:09:52.276895 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:09:52.676518158Z I0216 02:09:52.676366 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:09:53.872520203Z I0216 02:09:53.871960 1 request.go:700] Waited for 1.074049319s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller 2026-02-16T02:09:54.480509923Z I0216 02:09:54.480383 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:09:54.480973105Z E0216 02:09:54.480886 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:09:54.872754009Z I0216 02:09:54.872651 1 request.go:700] Waited for 1.196864927s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0 2026-02-16T02:09:54.876232765Z I0216 02:09:54.876165 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:09:55.121803731Z I0216 02:09:55.121735 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:09:55.124330684Z I0216 02:09:55.124282 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps cluster-policy-controller-config)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:07:29Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:09:55.141362686Z I0216 02:09:55.141260 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: " to "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps cluster-policy-controller-config)" 2026-02-16T02:09:56.275424253Z I0216 02:09:56.275307 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:09:56.275693610Z E0216 02:09:56.275647 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:09:56.475856748Z I0216 02:09:56.475766 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:09:57.276132272Z I0216 02:09:57.276008 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:09:57.276336517Z E0216 02:09:57.276272 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:09:59.909981624Z I0216 02:09:59.909847 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:09:59.917042439Z I0216 02:09:59.916889 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:07:29Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:09:59.932643567Z I0216 02:09:59.932528 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/cluster-policy-controller-config\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps cluster-policy-controller-config)" to "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: " 2026-02-16T02:10:01.275616610Z I0216 02:10:01.275490 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:10:01.275827595Z E0216 02:10:01.275779 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:10:01.476019804Z I0216 02:10:01.475775 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:10:03.075248838Z I0216 02:10:03.075119 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:10:03.075526195Z E0216 02:10:03.075472 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:10:03.277741053Z I0216 02:10:03.277631 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:10:04.700565218Z W0216 02:10:04.700431 1 dynamic_operator_client.go:355] .status.conditions["KubeControllerManagerStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-02-16T02:10:04.748288653Z I0216 02:10:04.748124 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:07:29Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:10:04.756523087Z I0216 02:10:04.752956 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:10:04.765418618Z I0216 02:10:04.765348 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: " to "NodeControllerDegraded: All master nodes are ready" 2026-02-16T02:10:05.871930402Z I0216 02:10:05.871864 1 request.go:700] Waited for 1.104502364s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0 2026-02-16T02:10:06.476253862Z I0216 02:10:06.476132 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:10:06.476553729Z E0216 02:10:06.476493 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:10:06.873573143Z I0216 02:10:06.873492 1 request.go:700] Waited for 1.038938806s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/kube-controller-manager-master-0 2026-02-16T02:10:06.882466673Z I0216 02:10:06.879136 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"kube-controller-manager","version":"1.31.14"},{"name":"operator","version":"4.18.32"}]}} 2026-02-16T02:10:06.882466673Z I0216 02:10:06.879156 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "kube-controller-manager" changed from "" to "1.31.14" 2026-02-16T02:10:06.882466673Z I0216 02:10:06.879199 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "operator" changed from "" to "4.18.32" 2026-02-16T02:10:07.097026529Z I0216 02:10:07.096464 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2026-02-16T02:10:07.102895624Z I0216 02:10:07.099618 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: status.versions changed from [{"raw-internal" "4.18.32"}] to [{"raw-internal" "4.18.32"} {"kube-controller-manager" "1.31.14"} {"operator" "4.18.32"}] 2026-02-16T02:10:07.109596331Z I0216 02:10:07.109250 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:10:07.109758315Z I0216 02:10:07.109715 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"StaticPodsDegraded: pod/kube-controller-manager-master-0 container \"cluster-policy-controller\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-cert-syncer\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-recovery-controller\" is waiting: ContainerCreating: \nNodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:07:29Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:10:07.554260978Z I0216 02:10:07.552035 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "StaticPodsDegraded: pod/kube-controller-manager-master-0 container \"cluster-policy-controller\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-cert-syncer\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-recovery-controller\" is waiting: ContainerCreating: \nNodeControllerDegraded: All master nodes are ready" 2026-02-16T02:10:08.272685469Z I0216 02:10:08.272608 1 request.go:700] Waited for 1.160950875s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa 2026-02-16T02:10:09.275661544Z I0216 02:10:09.275575 1 request.go:700] Waited for 1.273299654s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/kube-controller-manager-master-0 2026-02-16T02:10:09.399583739Z W0216 02:10:09.398293 1 dynamic_operator_client.go:352] .status.conditions["StaticPodsDegraded"].reason is missing; this will eventually be fatal 2026-02-16T02:10:09.399583739Z W0216 02:10:09.398328 1 dynamic_operator_client.go:355] .status.conditions["StaticPodsDegraded"].message is missing; this will eventually be fatal 2026-02-16T02:10:09.654727662Z E0216 02:10:09.654661 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2026-02-16T02:10:09.654847155Z I0216 02:10:09.654762 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2026-02-16T02:10:09.664928595Z I0216 02:10:09.664875 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T02:07:29Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T02:06:53Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T02:06:52Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T02:10:09.666021013Z I0216 02:10:09.665822 1 prune_controller.go:277] Nothing to prune 2026-02-16T02:10:09.740096341Z I0216 02:10:09.739108 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"fbc441e5-2de7-4b3f-a9f0-227620ed8a38", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "StaticPodsDegraded: pod/kube-controller-manager-master-0 container \"cluster-policy-controller\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-cert-syncer\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-recovery-controller\" is waiting: ContainerCreating: \nNodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready" config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000011405115144476207031007 0ustar00000000000000002026-02-16T02:09:33.728324198Z (string) (len=10) "csr-signer" 2026-02-16T02:09:33.728324198Z }, 2026-02-16T02:09:33.728324198Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-16T02:09:33.728324198Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-16T02:09:33.728324198Z (string) (len=20) "aggregator-client-ca", 2026-02-16T02:09:33.728324198Z (string) (len=9) "client-ca" 2026-02-16T02:09:33.728324198Z }, 2026-02-16T02:09:33.728324198Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T02:09:33.728324198Z (string) (len=17) "trusted-ca-bundle" 2026-02-16T02:09:33.728324198Z }, 2026-02-16T02:09:33.728324198Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-02-16T02:09:33.728324198Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-16T02:09:33.728324198Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-16T02:09:33.728324198Z Timeout: (time.Duration) 2m0s, 2026-02-16T02:09:33.728324198Z StaticPodManifestsLockFile: (string) "", 2026-02-16T02:09:33.728324198Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-16T02:09:33.728324198Z KubeletVersion: (string) "" 2026-02-16T02:09:33.728324198Z }) 2026-02-16T02:09:33.728324198Z I0216 02:09:33.642205 1 cmd.go:413] Getting controller reference for node master-0 2026-02-16T02:09:33.737467185Z I0216 02:09:33.737400 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-16T02:09:33.737558428Z I0216 02:09:33.737526 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T02:09:33.737558428Z I0216 02:09:33.737546 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T02:09:33.741044204Z I0216 02:09:33.741003 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-16T02:10:03.743160795Z I0216 02:10:03.743102 1 cmd.go:524] Getting installer pods for node master-0 2026-02-16T02:10:03.746261292Z I0216 02:10:03.746225 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2026-02-16T02:10:03.746261292Z I0216 02:10:03.746252 1 cmd.go:431] Querying kubelet version for node master-0 2026-02-16T02:10:03.748744894Z I0216 02:10:03.748709 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-02-16T02:10:03.748744894Z I0216 02:10:03.748736 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-02-16T02:10:03.748891717Z I0216 02:10:03.748859 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-02-16T02:10:03.748891717Z I0216 02:10:03.748873 1 cmd.go:229] Getting secrets ... 2026-02-16T02:10:03.750940908Z I0216 02:10:03.750769 1 copy.go:32] Got secret openshift-kube-controller-manager/localhost-recovery-client-token-2 2026-02-16T02:10:03.752418135Z I0216 02:10:03.752393 1 copy.go:32] Got secret openshift-kube-controller-manager/service-account-private-key-2 2026-02-16T02:10:03.754448715Z I0216 02:10:03.754425 1 copy.go:32] Got secret openshift-kube-controller-manager/serving-cert-2 2026-02-16T02:10:03.754486406Z I0216 02:10:03.754472 1 cmd.go:242] Getting config maps ... 2026-02-16T02:10:03.756242270Z I0216 02:10:03.756207 1 copy.go:60] Got configMap openshift-kube-controller-manager/cluster-policy-controller-config-2 2026-02-16T02:10:03.758065795Z I0216 02:10:03.758027 1 copy.go:60] Got configMap openshift-kube-controller-manager/config-2 2026-02-16T02:10:03.759626224Z I0216 02:10:03.759587 1 copy.go:60] Got configMap openshift-kube-controller-manager/controller-manager-kubeconfig-2 2026-02-16T02:10:03.760992158Z I0216 02:10:03.760962 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-cert-syncer-kubeconfig-2 2026-02-16T02:10:03.763616043Z I0216 02:10:03.763583 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-manager-pod-2 2026-02-16T02:10:03.947012715Z I0216 02:10:03.946935 1 copy.go:60] Got configMap openshift-kube-controller-manager/recycler-config-2 2026-02-16T02:10:04.146740712Z I0216 02:10:04.146658 1 copy.go:60] Got configMap openshift-kube-controller-manager/service-ca-2 2026-02-16T02:10:04.347125266Z I0216 02:10:04.346987 1 copy.go:60] Got configMap openshift-kube-controller-manager/serviceaccount-ca-2 2026-02-16T02:10:04.547183121Z I0216 02:10:04.547113 1 copy.go:52] Failed to get config map openshift-kube-controller-manager/cloud-config-2: configmaps "cloud-config-2" not found 2026-02-16T02:10:04.547183121Z I0216 02:10:04.547156 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token" ... 2026-02-16T02:10:04.547413747Z I0216 02:10:04.547383 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/ca.crt" ... 2026-02-16T02:10:04.547731145Z I0216 02:10:04.547688 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/namespace" ... 2026-02-16T02:10:04.547915459Z I0216 02:10:04.547878 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/token" ... 2026-02-16T02:10:04.548088514Z I0216 02:10:04.548053 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key" ... 2026-02-16T02:10:04.548178186Z I0216 02:10:04.548152 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key/service-account.key" ... 2026-02-16T02:10:04.548352960Z I0216 02:10:04.548328 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert" ... 2026-02-16T02:10:04.548451873Z I0216 02:10:04.548425 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.crt" ... 2026-02-16T02:10:04.548689309Z I0216 02:10:04.548652 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.key" ... 2026-02-16T02:10:04.548860283Z I0216 02:10:04.548835 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config" ... 2026-02-16T02:10:04.549068008Z I0216 02:10:04.549035 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config/config.yaml" ... 2026-02-16T02:10:04.549241072Z I0216 02:10:04.549213 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config" ... 2026-02-16T02:10:04.549336165Z I0216 02:10:04.549311 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config/config.yaml" ... 2026-02-16T02:10:04.549569491Z I0216 02:10:04.549541 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig" ... 2026-02-16T02:10:04.549675703Z I0216 02:10:04.549649 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig/kubeconfig" ... 2026-02-16T02:10:04.549848837Z I0216 02:10:04.549822 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig" ... 2026-02-16T02:10:04.549947400Z I0216 02:10:04.549922 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig" ... 2026-02-16T02:10:04.550128374Z I0216 02:10:04.550102 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod" ... 2026-02-16T02:10:04.550223867Z I0216 02:10:04.550199 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/version" ... 2026-02-16T02:10:04.550392901Z I0216 02:10:04.550366 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/forceRedeploymentReason" ... 2026-02-16T02:10:04.550680508Z I0216 02:10:04.550640 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/pod.yaml" ... 2026-02-16T02:10:04.550871973Z I0216 02:10:04.550837 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config" ... 2026-02-16T02:10:04.551026377Z I0216 02:10:04.550993 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config/recycler-pod.yaml" ... 2026-02-16T02:10:04.551211501Z I0216 02:10:04.551178 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca" ... 2026-02-16T02:10:04.551321564Z I0216 02:10:04.551288 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca/ca-bundle.crt" ... 2026-02-16T02:10:04.551584870Z I0216 02:10:04.551541 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca" ... 2026-02-16T02:10:04.551685503Z I0216 02:10:04.551666 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-02-16T02:10:04.551884908Z I0216 02:10:04.551855 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs" ... 2026-02-16T02:10:04.551965400Z I0216 02:10:04.551949 1 cmd.go:229] Getting secrets ... 2026-02-16T02:10:04.758229790Z I0216 02:10:04.757835 1 copy.go:32] Got secret openshift-kube-controller-manager/csr-signer 2026-02-16T02:10:04.948933463Z I0216 02:10:04.948652 1 copy.go:32] Got secret openshift-kube-controller-manager/kube-controller-manager-client-cert-key 2026-02-16T02:10:04.948933463Z I0216 02:10:04.948701 1 cmd.go:242] Getting config maps ... 2026-02-16T02:10:05.148400224Z I0216 02:10:05.148270 1 copy.go:60] Got configMap openshift-kube-controller-manager/aggregator-client-ca 2026-02-16T02:10:05.349937216Z I0216 02:10:05.349830 1 copy.go:60] Got configMap openshift-kube-controller-manager/client-ca 2026-02-16T02:10:05.629549746Z I0216 02:10:05.628715 1 copy.go:60] Got configMap openshift-kube-controller-manager/trusted-ca-bundle 2026-02-16T02:10:05.629549746Z I0216 02:10:05.629156 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer" ... 2026-02-16T02:10:05.629549746Z I0216 02:10:05.629361 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.crt" ... 2026-02-16T02:10:05.629549746Z I0216 02:10:05.629531 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.key" ... 2026-02-16T02:10:05.629705720Z I0216 02:10:05.629644 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key" ... 2026-02-16T02:10:05.629752031Z I0216 02:10:05.629722 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.key" ... 2026-02-16T02:10:05.629883684Z I0216 02:10:05.629829 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.crt" ... 2026-02-16T02:10:05.629997067Z I0216 02:10:05.629953 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca" ... 2026-02-16T02:10:05.630102600Z I0216 02:10:05.630060 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca/ca-bundle.crt" ... 2026-02-16T02:10:05.630218763Z I0216 02:10:05.630169 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca" ... 2026-02-16T02:10:05.630282224Z I0216 02:10:05.630249 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca/ca-bundle.crt" ... 2026-02-16T02:10:05.630680504Z I0216 02:10:05.630629 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle" ... 2026-02-16T02:10:05.631034653Z I0216 02:10:05.630988 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle/ca-bundle.crt" ... 2026-02-16T02:10:05.631649088Z I0216 02:10:05.631604 1 cmd.go:335] Getting pod configmaps/kube-controller-manager-pod-2 -n openshift-kube-controller-manager 2026-02-16T02:10:05.747633767Z I0216 02:10:05.747536 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-02-16T02:10:05.747720869Z I0216 02:10:05.747584 1 cmd.go:379] Writing a pod under "kube-controller-manager-pod.yaml" key 2026-02-16T02:10:05.747720869Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-klzk6 --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-16T02:10:05.753757699Z I0216 02:10:05.753679 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/kube-controller-manager-pod.yaml" ... 2026-02-16T02:10:05.754073177Z I0216 02:10:05.754022 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-02-16T02:10:05.754073177Z I0216 02:10:05.754047 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-02-16T02:10:05.754073177Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-klzk6 --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715144476207027215 0ustar00000000000000002026-02-16T02:07:26.432286700Z I0216 02:07:26.432062 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00045c0a0 cert-dir:0xc00045c460 cert-secrets:0xc000309e00 configmaps:0xc000309540 namespace:0xc000309180 optional-cert-configmaps:0xc00045c1e0 optional-cert-secrets:0xc00045c140 optional-configmaps:0xc0003097c0 optional-secrets:0xc000309680 pod:0xc0003092c0 pod-manifest-dir:0xc000309a40 resource-dir:0xc000309900 revision:0xc000309040 secrets:0xc000309400 v:0xc000312d20] [0xc000312d20 0xc000309040 0xc000309180 0xc0003092c0 0xc000309900 0xc000309a40 0xc000309540 0xc0003097c0 0xc000309400 0xc000309680 0xc00045c460 0xc00045c0a0 0xc00045c1e0 0xc000309e00 0xc00045c140] [] map[cert-configmaps:0xc00045c0a0 cert-dir:0xc00045c460 cert-secrets:0xc000309e00 configmaps:0xc000309540 help:0xc0003130e0 kubeconfig:0xc000308f00 log-flush-frequency:0xc000312c80 namespace:0xc000309180 optional-cert-configmaps:0xc00045c1e0 optional-cert-secrets:0xc00045c140 optional-configmaps:0xc0003097c0 optional-secrets:0xc000309680 pod:0xc0003092c0 pod-manifest-dir:0xc000309a40 pod-manifests-lock-file:0xc000309cc0 resource-dir:0xc000309900 revision:0xc000309040 secrets:0xc000309400 timeout-duration:0xc000309b80 v:0xc000312d20 vmodule:0xc000312dc0] [0xc000308f00 0xc000309040 0xc000309180 0xc0003092c0 0xc000309400 0xc000309540 0xc000309680 0xc0003097c0 0xc000309900 0xc000309a40 0xc000309b80 0xc000309cc0 0xc000309e00 0xc00045c0a0 0xc00045c140 0xc00045c1e0 0xc00045c460 0xc000312c80 0xc000312d20 0xc000312dc0 0xc0003130e0] [0xc00045c0a0 0xc00045c460 0xc000309e00 0xc000309540 0xc0003130e0 0xc000308f00 0xc000312c80 0xc000309180 0xc00045c1e0 0xc00045c140 0xc0003097c0 0xc000309680 0xc0003092c0 0xc000309a40 0xc000309cc0 0xc000309900 0xc000309040 0xc000309400 0xc000309b80 0xc000312d20 0xc000312dc0] map[104:0xc0003130e0 118:0xc000312d20] [] -1 0 0xc000b73290 true 0xae1c20 []} 2026-02-16T02:07:26.432600978Z I0216 02:07:26.432569 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00062c680)({ 2026-02-16T02:07:26.432600978Z KubeConfig: (string) "", 2026-02-16T02:07:26.432600978Z KubeClient: (kubernetes.Interface) , 2026-02-16T02:07:26.432600978Z Revision: (string) (len=1) "1", 2026-02-16T02:07:26.432600978Z NodeName: (string) "", 2026-02-16T02:07:26.432600978Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-02-16T02:07:26.432600978Z Clock: (clock.RealClock) { 2026-02-16T02:07:26.432600978Z }, 2026-02-16T02:07:26.432600978Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-02-16T02:07:26.432600978Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-16T02:07:26.432600978Z (string) (len=11) "etcd-client", 2026-02-16T02:07:26.432600978Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-02-16T02:07:26.432600978Z (string) (len=31) "localhost-recovery-client-token" 2026-02-16T02:07:26.432600978Z }, 2026-02-16T02:07:26.432600978Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-16T02:07:26.432600978Z (string) (len=17) "encryption-config", 2026-02-16T02:07:26.432600978Z (string) (len=21) "webhook-authenticator" 2026-02-16T02:07:26.432600978Z }, 2026-02-16T02:07:26.432600978Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-16T02:07:26.432600978Z (string) (len=18) "kube-apiserver-pod", 2026-02-16T02:07:26.432600978Z (string) (len=6) "config", 2026-02-16T02:07:26.432600978Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-02-16T02:07:26.432600978Z (string) (len=28) "bound-sa-token-signing-certs", 2026-02-16T02:07:26.432600978Z (string) (len=15) "etcd-serving-ca", 2026-02-16T02:07:26.432600978Z (string) (len=18) "kubelet-serving-ca", 2026-02-16T02:07:26.432600978Z (string) (len=22) "sa-token-signing-certs", 2026-02-16T02:07:26.432600978Z (string) (len=29) "kube-apiserver-audit-policies" 2026-02-16T02:07:26.432600978Z }, 2026-02-16T02:07:26.432600978Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-16T02:07:26.432600978Z (string) (len=14) "oauth-metadata", 2026-02-16T02:07:26.432600978Z (string) (len=12) "cloud-config", 2026-02-16T02:07:26.432600978Z (string) (len=24) "kube-apiserver-server-ca" 2026-02-16T02:07:26.432600978Z }, 2026-02-16T02:07:26.432600978Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-02-16T02:07:26.432600978Z (string) (len=17) "aggregator-client", 2026-02-16T02:07:26.432600978Z (string) (len=30) "localhost-serving-cert-certkey", 2026-02-16T02:07:26.432600978Z (string) (len=31) "service-network-serving-certkey", 2026-02-16T02:07:26.432600978Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-02-16T02:07:26.432600978Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-02-16T02:07:26.432600978Z (string) (len=33) "bound-service-account-signing-key", 2026-02-16T02:07:26.432600978Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-02-16T02:07:26.432600978Z (string) (len=31) "check-endpoints-client-cert-key", 2026-02-16T02:07:26.432600978Z (string) (len=14) "kubelet-client", 2026-02-16T02:07:26.432600978Z (string) (len=16) "node-kubeconfigs" 2026-02-16T02:07:26.432600978Z }, 2026-02-16T02:07:26.432600978Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-02-16T02:07:26.432600978Z (string) (len=17) "user-serving-cert", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-000", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-001", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-002", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-003", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-004", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-005", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-006", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-007", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-008", 2026-02-16T02:07:26.432600978Z (string) (len=21) "user-serving-cert-009" 2026-02-16T02:07:26.432600978Z }, 2026-02-16T02:07:26.432600978Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-16T02:07:26.432600978Z (string) (len=20) "aggregator-client-ca", 2026-02-16T02:07:26.432600978Z (string) (len=9) "client-ca", 2026-02-16T02:07:26.432600978Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-16T02:07:26.432600978Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-16T02:07:26.432600978Z }, 2026-02-16T02:07:26.432600978Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T02:07:26.432600978Z (string) (len=17) "trusted-ca-bundle" 2026-02-16T02:07:26.432600978Z }, 2026-02-16T02:07:26.432600978Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-16T02:07:26.432600978Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-16T02:07:26.432600978Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-16T02:07:26.432600978Z Timeout: (time.Duration) 2m0s, 2026-02-16T02:07:26.432600978Z StaticPodManifestsLockFile: (string) "", 2026-02-16T02:07:26.432600978Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-16T02:07:26.432600978Z KubeletVersion: (string) "" 2026-02-16T02:07:26.432600978Z }) 2026-02-16T02:07:26.433534071Z I0216 02:07:26.433483 1 cmd.go:413] Getting controller reference for node master-0 2026-02-16T02:07:26.443123569Z I0216 02:07:26.443079 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-16T02:07:26.443149999Z I0216 02:07:26.443137 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T02:07:26.443161070Z I0216 02:07:26.443151 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T02:07:26.445332414Z I0216 02:07:26.445297 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-16T02:07:56.445453796Z I0216 02:07:56.445362 1 cmd.go:524] Getting installer pods for node master-0 2026-02-16T02:08:10.446580979Z F0216 02:08:10.446398 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115144476207022675 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"80f43f07-ce08-4c21-9463-ea983a110244","resourceVersion":"9223","creationTimestamp":"2026-02-16T02:07:24Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.50/23\"],\"mac_address\":\"0a:58:0a:80:00:32\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.50/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.50\"\n ],\n \"mac\": \"0a:58:0a:80:00:32\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"6e7ddeeb-1371-47ff-bfb6-10129639d2ba"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:08:12Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:24Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:08:11Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:08:11Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:24Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.50","podIPs":[{"ip":"10.128.0.50"}],"startTime":"2026-02-16T02:07:24Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0216 02:07:26.433483 1 cmd.go:413] Getting controller reference for node master-0\nI0216 02:07:26.443079 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0216 02:07:26.443137 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 02:07:26.443151 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 02:07:26.445297 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0216 02:07:56.445362 1 cmd.go:524] Getting installer pods for node master-0\nF0216 02:08:10.446398 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-16T02:07:25Z","finishedAt":"2026-02-16T02:08:10Z","containerID":"cri-o://b4ee28c7394858e0cf4928c25f023b84c89ee6af3676ca6c853d7b858571c63f"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://b4ee28c7394858e0cf4928c25f023b84c89ee6af3676ca6c853d7b858571c63f","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615144476207035775 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-16T02:04:54.746675531Z I0216 02:04:54.746383 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010630415144476207032671 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-16T02:10:03.420599069Z I0216 02:10:03.415975 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:03.500593264Z I0216 02:10:03.500513 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:03.506611544Z I0216 02:10:03.506542 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:03.615599339Z I0216 02:10:03.615534 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:03.699841780Z I0216 02:10:03.699769 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:03.705944561Z I0216 02:10:03.705890 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:03.816421403Z I0216 02:10:03.816325 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:03.899641849Z I0216 02:10:03.899554 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:03.906057348Z I0216 02:10:03.906007 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.016692654Z I0216 02:10:04.016601 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.103252293Z I0216 02:10:04.103133 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.106023081Z I0216 02:10:04.105957 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.216072613Z I0216 02:10:04.216000 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.299566385Z I0216 02:10:04.299401 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.306345743Z I0216 02:10:04.306201 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.415670857Z I0216 02:10:04.415623 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.499282992Z I0216 02:10:04.499215 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.505819315Z I0216 02:10:04.505773 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.616529382Z I0216 02:10:04.616432 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.699636345Z I0216 02:10:04.699562 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.705947092Z I0216 02:10:04.705877 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.715514429Z I0216 02:10:04.714813 1 controller.go:615] quota admission added evaluator for: machinehealthchecks.machine.openshift.io 2026-02-16T02:10:04.715514429Z I0216 02:10:04.714910 1 controller.go:615] quota admission added evaluator for: machinehealthchecks.machine.openshift.io 2026-02-16T02:10:04.816066295Z I0216 02:10:04.815990 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.899902296Z I0216 02:10:04.899816 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:04.905925135Z I0216 02:10:04.905854 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.016696375Z I0216 02:10:05.016600 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.099056169Z I0216 02:10:05.098977 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.106379891Z I0216 02:10:05.106317 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.216015252Z I0216 02:10:05.215904 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.299167756Z I0216 02:10:05.299073 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.306341334Z I0216 02:10:05.306284 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.416133419Z I0216 02:10:05.416013 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.500460892Z I0216 02:10:05.500367 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.506461751Z I0216 02:10:05.506355 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.616366109Z I0216 02:10:05.616239 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.700999290Z I0216 02:10:05.700898 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.706631959Z I0216 02:10:05.706564 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.815743878Z I0216 02:10:05.815663 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.899595979Z I0216 02:10:05.899520 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:05.906587292Z I0216 02:10:05.906528 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.016948862Z I0216 02:10:06.016874 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.099411748Z I0216 02:10:06.099288 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.105917250Z I0216 02:10:06.105860 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.218086104Z I0216 02:10:06.216205 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.299845823Z I0216 02:10:06.299765 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.305904874Z I0216 02:10:06.305857 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.416709344Z I0216 02:10:06.416632 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.500914814Z I0216 02:10:06.499752 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.507286202Z I0216 02:10:06.507122 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.615981860Z I0216 02:10:06.615918 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.702167288Z I0216 02:10:06.702096 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.705889471Z I0216 02:10:06.705842 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.815559063Z I0216 02:10:06.815496 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.899453335Z I0216 02:10:06.899375 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:06.906150751Z I0216 02:10:06.906106 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.015704480Z I0216 02:10:07.015630 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.099551512Z I0216 02:10:07.099486 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.108283078Z I0216 02:10:07.108230 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.216428572Z I0216 02:10:07.216331 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.560205845Z I0216 02:10:07.560151 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.570673905Z I0216 02:10:07.569713 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.684990302Z I0216 02:10:07.684905 1 trace.go:236] Trace[311554021]: "List" accept:application/json,audit-id:c23800df-8e91-4818-9784-fbcc6beee539,client:10.128.0.61,api-group:operators.coreos.com,api-version:v1alpha1,name:,subresource:,namespace:openshift-kube-storage-version-migrator,protocol:HTTP/2.0,resource:installplans,scope:namespace,url:/apis/operators.coreos.com/v1alpha1/namespaces/openshift-kube-storage-version-migrator/installplans,user-agent:insights-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:LIST (16-Feb-2026 02:10:07.099) (total time: 585ms): 2026-02-16T02:10:07.684990302Z Trace[311554021]: [585.128223ms] [585.128223ms] END 2026-02-16T02:10:07.686479199Z I0216 02:10:07.686419 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.695969735Z I0216 02:10:07.695900 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.703750138Z I0216 02:10:07.703707 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.768474585Z I0216 02:10:07.765151 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.811459541Z I0216 02:10:07.808808 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.816390904Z I0216 02:10:07.816359 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.868459236Z I0216 02:10:07.865328 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.906454019Z I0216 02:10:07.906120 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:07.997424987Z I0216 02:10:07.997333 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.016538722Z I0216 02:10:08.016460 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.110915334Z I0216 02:10:08.110780 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.205356618Z I0216 02:10:08.205276 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.221017947Z I0216 02:10:08.220714 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.303362531Z I0216 02:10:08.303283 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.305740900Z I0216 02:10:08.305676 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.688633043Z I0216 02:10:08.688430 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.688729306Z I0216 02:10:08.688691 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.703840331Z I0216 02:10:08.703766 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.710635209Z I0216 02:10:08.710578 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.776100014Z I0216 02:10:08.775998 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:08.776779151Z I0216 02:10:08.776697 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.036071987Z I0216 02:10:09.034414 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.040659501Z I0216 02:10:09.040567 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.052289499Z I0216 02:10:09.052182 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.065241651Z I0216 02:10:09.065153 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.098864735Z I0216 02:10:09.098730 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.106888445Z I0216 02:10:09.106608 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.396562554Z I0216 02:10:09.395802 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.396810321Z I0216 02:10:09.396748 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.415356661Z I0216 02:10:09.415249 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.449584971Z I0216 02:10:09.449495 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.506117654Z I0216 02:10:09.506022 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.506935044Z I0216 02:10:09.506898 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.685597248Z I0216 02:10:09.684822 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.703223876Z I0216 02:10:09.703158 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T02:10:09.706518078Z I0216 02:10:09.706391 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015144476207031155 0ustar00000000000000002026-02-16T02:04:51.053160753Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115144476207036757 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-54984b6678-dsjz22026-02-16T02:09:33.271661014Z I0216 02:09:33.269950 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T02:09:33.271661014Z I0216 02:09:33.270054 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T02:09:33.271661014Z I0216 02:09:33.271446 1 observer_polling.go:159] Starting file observer 2026-02-16T02:09:35.889813197Z I0216 02:09:35.888421 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-16T02:09:50.707799414Z I0216 02:09:50.707018 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T02:09:50.707799414Z W0216 02:09:50.707063 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:09:50.707799414Z W0216 02:09:50.707073 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:09:50.707799414Z W0216 02:09:50.707082 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T02:09:50.707799414Z W0216 02:09:50.707089 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T02:09:50.707799414Z W0216 02:09:50.707095 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T02:09:50.707799414Z W0216 02:09:50.707101 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T02:09:50.724515539Z I0216 02:09:50.724129 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T02:09:50.725208556Z I0216 02:09:50.724597 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-02-16T02:09:50.737741377Z I0216 02:09:50.737612 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T02:09:50.737741377Z I0216 02:09:50.737675 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T02:09:50.737741377Z I0216 02:09:50.737696 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T02:09:50.737741377Z I0216 02:09:50.737728 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T02:09:50.737927902Z I0216 02:09:50.737846 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T02:09:50.738559727Z I0216 02:09:50.737952 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:09:50.738559727Z I0216 02:09:50.737968 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:50.738559727Z I0216 02:09:50.737986 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:09:50.738559727Z I0216 02:09:50.737994 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:50.842009795Z I0216 02:09:50.839112 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:50.842009795Z I0216 02:09:50.839163 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T02:09:50.842009795Z I0216 02:09:50.839265 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000003426215144476207037162 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-54984b6678-dsjz22026-02-16T02:07:56.669801535Z I0216 02:07:56.669796 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionState controller ... 2026-02-16T02:07:56.669812675Z I0216 02:07:56.669803 1 base_controller.go:123] Shutting down worker of kube-apiserver-Node controller ... 2026-02-16T02:07:56.669823375Z I0216 02:07:56.669811 1 base_controller.go:113] All kube-apiserver-Node workers have been terminated 2026-02-16T02:07:56.669823375Z I0216 02:07:56.669813 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionPrune controller ... 2026-02-16T02:07:56.669823375Z I0216 02:07:56.669819 1 controller_manager.go:54] kube-apiserver-Node controller terminated 2026-02-16T02:07:56.669834966Z I0216 02:07:56.669819 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-02-16T02:07:56.669834966Z I0216 02:07:56.669807 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodStateFallback controller ... 2026-02-16T02:07:56.669834966Z I0216 02:07:56.669811 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-02-16T02:07:56.669846816Z I0216 02:07:56.669834 1 base_controller.go:113] All kube-apiserver-StaticPodStateFallback workers have been terminated 2026-02-16T02:07:56.669846816Z I0216 02:07:56.669805 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionState workers have been terminated 2026-02-16T02:07:56.669867437Z I0216 02:07:56.669773 1 base_controller.go:113] All GuardController workers have been terminated 2026-02-16T02:07:56.669867437Z I0216 02:07:56.669848 1 base_controller.go:123] Shutting down worker of ServiceAccountIssuerController controller ... 2026-02-16T02:07:56.669867437Z I0216 02:07:56.669702 1 base_controller.go:181] Shutting down kube-apiserver-InstallerState ... 2026-02-16T02:07:56.669867437Z I0216 02:07:56.669855 1 controller_manager.go:54] GuardController controller terminated 2026-02-16T02:07:56.669867437Z I0216 02:07:56.669794 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-16T02:07:56.669867437Z I0216 02:07:56.669860 1 base_controller.go:113] All kube-apiserver-InstallerState workers have been terminated 2026-02-16T02:07:56.669881167Z I0216 02:07:56.669743 1 base_controller.go:181] Shutting down kube-apiserver-StaticPodState ... 2026-02-16T02:07:56.669881167Z I0216 02:07:56.669865 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-16T02:07:56.669881167Z I0216 02:07:56.669840 1 base_controller.go:181] Shutting down webhookSupportabilityController ... 2026-02-16T02:07:56.669881167Z I0216 02:07:56.669870 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.669902147Z I0216 02:07:56.669881 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-02-16T02:07:56.669902147Z I0216 02:07:56.669777 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.669902147Z I0216 02:07:56.669885 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.669902147Z I0216 02:07:56.669892 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.669902147Z I0216 02:07:56.669896 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.669914648Z I0216 02:07:56.669899 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.669914648Z I0216 02:07:56.669891 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-02-16T02:07:56.669925078Z I0216 02:07:56.669914 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-apiserver controller ... 2026-02-16T02:07:56.669925078Z I0216 02:07:56.669921 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2026-02-16T02:07:56.669936008Z I0216 02:07:56.669918 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-147690072/tls.crt::/tmp/serving-cert-147690072/tls.key" 2026-02-16T02:07:56.669936008Z I0216 02:07:56.669924 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-02-16T02:07:56.669946439Z I0216 02:07:56.669933 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-02-16T02:07:56.669946439Z I0216 02:07:56.669940 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-02-16T02:07:56.669956829Z I0216 02:07:56.669947 1 base_controller.go:123] Shutting down worker of kube-apiserver-RemoveStaleConditions controller ... 2026-02-16T02:07:56.669956829Z I0216 02:07:56.669952 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2026-02-16T02:07:56.669967539Z I0216 02:07:56.669932 1 base_controller.go:123] Shutting down worker of KubeletVersionSkewController controller ... 2026-02-16T02:07:56.669979619Z I0216 02:07:56.669959 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-02-16T02:07:56.669979619Z I0216 02:07:56.669956 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-02-16T02:07:56.669990100Z I0216 02:07:56.669979 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-02-16T02:07:56.669990100Z I0216 02:07:56.669982 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.670001160Z I0216 02:07:56.669987 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.670001160Z I0216 02:07:56.669987 1 base_controller.go:123] Shutting down worker of EventWatchController controller ... 2026-02-16T02:07:56.670001160Z I0216 02:07:56.669993 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-02-16T02:07:56.670001160Z I0216 02:07:56.669998 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670016630Z I0216 02:07:56.669999 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.670016630Z I0216 02:07:56.669994 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.670016630Z I0216 02:07:56.670006 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670016630Z I0216 02:07:56.670011 1 base_controller.go:123] Shutting down worker of highCPUUsageAlertController controller ... 2026-02-16T02:07:56.670029391Z I0216 02:07:56.669928 1 base_controller.go:123] Shutting down worker of NodeKubeconfigController controller ... 2026-02-16T02:07:56.670029391Z I0216 02:07:56.670013 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-02-16T02:07:56.670029391Z I0216 02:07:56.670021 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-02-16T02:07:56.670041651Z I0216 02:07:56.670015 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670041651Z I0216 02:07:56.670025 1 base_controller.go:113] All NodeKubeconfigController workers have been terminated 2026-02-16T02:07:56.670041651Z I0216 02:07:56.670032 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-02-16T02:07:56.670053551Z I0216 02:07:56.670034 1 base_controller.go:123] Shutting down worker of PodSecurityReadinessController controller ... 2026-02-16T02:07:56.670064971Z I0216 02:07:56.669893 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.670064971Z I0216 02:07:56.670053 1 base_controller.go:113] All PodSecurityReadinessController workers have been terminated 2026-02-16T02:07:56.670076262Z I0216 02:07:56.670065 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670076262Z I0216 02:07:56.669888 1 base_controller.go:113] All RevisionController workers have been terminated 2026-02-16T02:07:56.670087572Z I0216 02:07:56.670079 1 controller_manager.go:54] RevisionController controller terminated 2026-02-16T02:07:56.670087572Z I0216 02:07:56.669980 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-02-16T02:07:56.670123983Z I0216 02:07:56.670095 1 base_controller.go:113] All PruneController workers have been terminated 2026-02-16T02:07:56.670123983Z I0216 02:07:56.670108 1 controller_manager.go:54] PruneController controller terminated 2026-02-16T02:07:56.670123983Z I0216 02:07:56.669991 1 builder.go:335] server exited 2026-02-16T02:07:56.670187055Z I0216 02:07:56.669836 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-02-16T02:07:56.670187055Z I0216 02:07:56.669841 1 base_controller.go:181] Shutting down ServiceAccountIssuerController ... 2026-02-16T02:07:56.670187055Z I0216 02:07:56.670174 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-02-16T02:07:56.670187055Z I0216 02:07:56.669847 1 controller_manager.go:54] kube-apiserver-StaticPodStateFallback controller terminated 2026-02-16T02:07:56.670187055Z I0216 02:07:56.669858 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-16T02:07:56.670204975Z I0216 02:07:56.670187 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-16T02:07:56.670204975Z I0216 02:07:56.670192 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670204975Z I0216 02:07:56.669868 1 controller_manager.go:54] kube-apiserver-InstallerState controller terminated 2026-02-16T02:07:56.670204975Z I0216 02:07:56.669854 1 base_controller.go:181] Shutting down KubeletVersionSkewController ... 2026-02-16T02:07:56.670217135Z I0216 02:07:56.670203 1 base_controller.go:113] All KubeletVersionSkewController workers have been terminated 2026-02-16T02:07:56.670217135Z I0216 02:07:56.669744 1 base_controller.go:181] Shutting down CertRotationController ... 2026-02-16T02:07:56.670217135Z I0216 02:07:56.670213 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-02-16T02:07:56.670229196Z I0216 02:07:56.670216 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670229196Z I0216 02:07:56.669713 1 base_controller.go:181] Shutting down openshift-kube-apiserver-EncryptionPrune ... 2026-02-16T02:07:56.670240036Z I0216 02:07:56.670226 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionPrune workers have been terminated 2026-02-16T02:07:56.670240036Z I0216 02:07:56.669870 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2026-02-16T02:07:56.670250916Z I0216 02:07:56.670240 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2026-02-16T02:07:56.670250916Z I0216 02:07:56.669830 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionKey controller ... 2026-02-16T02:07:56.670264196Z I0216 02:07:56.670255 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionKey workers have been terminated 2026-02-16T02:07:56.670274657Z I0216 02:07:56.669905 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670274657Z I0216 02:07:56.669909 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.670285617Z I0216 02:07:56.670275 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670285617Z I0216 02:07:56.669965 1 base_controller.go:123] Shutting down worker of cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller ... 2026-02-16T02:07:56.670296407Z I0216 02:07:56.670287 1 base_controller.go:113] All cluster-kube-apiserver-operator-UnsupportedConfigOverrides workers have been terminated 2026-02-16T02:07:56.670306838Z I0216 02:07:56.670296 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2026-02-16T02:07:56.670306838Z I0216 02:07:56.669976 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-02-16T02:07:56.670317678Z I0216 02:07:56.670310 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670328138Z I0216 02:07:56.669992 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-02-16T02:07:56.670328138Z I0216 02:07:56.670006 1 base_controller.go:113] All EventWatchController workers have been terminated 2026-02-16T02:07:56.670338968Z I0216 02:07:56.670015 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-02-16T02:07:56.670349399Z I0216 02:07:56.670337 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-02-16T02:07:56.670349399Z I0216 02:07:56.670023 1 base_controller.go:123] Shutting down worker of SCCReconcileController controller ... 2026-02-16T02:07:56.670363749Z I0216 02:07:56.670352 1 base_controller.go:113] All SCCReconcileController workers have been terminated 2026-02-16T02:08:01.665007797Z I0216 02:08:01.664943 1 observer_polling.go:162] Shutting down file observer 2026-02-16T02:08:30.668185107Z E0216 02:08:30.668087 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-16T02:08:30.668185107Z W0216 02:08:30.668138 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-dsjz2.json0000640000000000000000000001363015144476207027750 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-54984b6678-dsjz2","generateName":"kube-apiserver-operator-54984b6678-","namespace":"openshift-kube-apiserver-operator","uid":"980aa005-f51d-4ca2-aee6-a6fdeefd86d0","resourceVersion":"9264","creationTimestamp":"2026-02-16T02:05:17Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"54984b6678"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-54984b6678","uid":"dc640227-ed12-4c93-81e2-618c819c37b7","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:31Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:33Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:33Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-02-16T02:06:28Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-02-16T02:09:33Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T02:06:30Z","finishedAt":"2026-02-16T02:08:30Z","containerID":"cri-o://ff658673f7455373622a5b5ee3d4af2de4dca2c4bf35a4e09ed477558c99902a"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://a6d90aff6f8ce2ab976f48907c4d1b01e98afde362aa201e2dc712d88fff6eb6","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007420215144476207025211 0ustar00000000000000002026-02-16T02:07:53.244704733Z 2026-02-16T02:07:53.244704733Z cluster-etcd-operator rev \ 2026-02-16T02:07:53.244704733Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-02-16T02:07:53.244704733Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-02-16T02:07:53.244704733Z --client-key-file=$(ETCDCTL_KEY) \ 2026-02-16T02:07:53.244704733Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-02-16T02:07:53.244704733Z securityContext: 2026-02-16T02:07:53.244704733Z privileged: true 2026-02-16T02:07:53.244704733Z resources: 2026-02-16T02:07:53.244704733Z requests: 2026-02-16T02:07:53.244704733Z memory: 50Mi 2026-02-16T02:07:53.244704733Z cpu: 10m 2026-02-16T02:07:53.244704733Z env: 2026-02-16T02:07:53.244704733Z - name: "ALL_ETCD_ENDPOINTS" 2026-02-16T02:07:53.244704733Z value: "https://192.168.32.10:2379" 2026-02-16T02:07:53.244704733Z - name: "ETCDCTL_API" 2026-02-16T02:07:53.244704733Z value: "3" 2026-02-16T02:07:53.244704733Z - name: "ETCDCTL_CACERT" 2026-02-16T02:07:53.244704733Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-02-16T02:07:53.244704733Z - name: "ETCDCTL_CERT" 2026-02-16T02:07:53.244704733Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-02-16T02:07:53.244704733Z - name: "ETCDCTL_ENDPOINTS" 2026-02-16T02:07:53.244704733Z value: "https://192.168.32.10:2379" 2026-02-16T02:07:53.244704733Z - name: "ETCDCTL_KEY" 2026-02-16T02:07:53.244704733Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-02-16T02:07:53.244704733Z - name: "ETCD_CIPHER_SUITES" 2026-02-16T02:07:53.244704733Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-02-16T02:07:53.244704733Z - name: "ETCD_DATA_DIR" 2026-02-16T02:07:53.244704733Z value: "/var/lib/etcd" 2026-02-16T02:07:53.244704733Z - name: "ETCD_ELECTION_TIMEOUT" 2026-02-16T02:07:53.244704733Z value: "2500" 2026-02-16T02:07:53.244704733Z - name: "ETCD_ENABLE_PPROF" 2026-02-16T02:07:53.244788765Z value: "true" 2026-02-16T02:07:53.244788765Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-02-16T02:07:53.244788765Z value: "1" 2026-02-16T02:07:53.244788765Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-02-16T02:07:53.244788765Z value: "200ms" 2026-02-16T02:07:53.244788765Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-02-16T02:07:53.244788765Z value: "5s" 2026-02-16T02:07:53.244788765Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-02-16T02:07:53.244788765Z value: "500" 2026-02-16T02:07:53.244788765Z - name: "ETCD_IMAGE" 2026-02-16T02:07:53.244788765Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3" 2026-02-16T02:07:53.244788765Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-02-16T02:07:53.244788765Z value: "existing" 2026-02-16T02:07:53.244788765Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-02-16T02:07:53.244788765Z value: "8589934592" 2026-02-16T02:07:53.244788765Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-02-16T02:07:53.244788765Z value: "true" 2026-02-16T02:07:53.244788765Z - name: "ETCD_TLS_MIN_VERSION" 2026-02-16T02:07:53.244788765Z value: "TLS1.2" 2026-02-16T02:07:53.244788765Z - name: "NODE_master_0_ETCD_NAME" 2026-02-16T02:07:53.244788765Z value: "master-0" 2026-02-16T02:07:53.244788765Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-02-16T02:07:53.244788765Z value: "192.168.32.10" 2026-02-16T02:07:53.244788765Z - name: "NODE_master_0_IP" 2026-02-16T02:07:53.244788765Z value: "192.168.32.10" 2026-02-16T02:07:53.244788765Z volumeMounts: 2026-02-16T02:07:53.244788765Z - mountPath: /var/lib/etcd 2026-02-16T02:07:53.244788765Z name: data-dir 2026-02-16T02:07:53.244788765Z - mountPath: /etc/kubernetes/static-pod-certs 2026-02-16T02:07:53.244788765Z name: cert-dir 2026-02-16T02:07:53.244788765Z hostNetwork: true 2026-02-16T02:07:53.244788765Z priorityClassName: system-node-critical 2026-02-16T02:07:53.244788765Z tolerations: 2026-02-16T02:07:53.244788765Z - operator: "Exists" 2026-02-16T02:07:53.244788765Z volumes: 2026-02-16T02:07:53.244788765Z - hostPath: 2026-02-16T02:07:53.244788765Z path: /etc/kubernetes/manifests 2026-02-16T02:07:53.244788765Z name: static-pod-dir 2026-02-16T02:07:53.244788765Z - hostPath: 2026-02-16T02:07:53.244788765Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-02-16T02:07:53.244788765Z name: resource-dir 2026-02-16T02:07:53.244788765Z - hostPath: 2026-02-16T02:07:53.244788765Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-02-16T02:07:53.244788765Z name: cert-dir 2026-02-16T02:07:53.244788765Z - hostPath: 2026-02-16T02:07:53.244788765Z path: /var/lib/etcd 2026-02-16T02:07:53.244788765Z type: "" 2026-02-16T02:07:53.244788765Z name: data-dir 2026-02-16T02:07:53.244788765Z - hostPath: 2026-02-16T02:07:53.244788765Z path: /usr/local/bin 2026-02-16T02:07:53.244788765Z name: usr-local-bin 2026-02-16T02:07:53.244788765Z - hostPath: 2026-02-16T02:07:53.244788765Z path: /var/log/etcd 2026-02-16T02:07:53.244788765Z name: log-dir 2026-02-16T02:07:53.244788765Z - hostPath: 2026-02-16T02:07:53.244788765Z path: /etc/kubernetes 2026-02-16T02:07:53.244788765Z name: config-dir 2026-02-16T02:07:53.244788765Z - hostPath: 2026-02-16T02:07:53.244788765Z path: /var/lib/etcd-auto-backup 2026-02-16T02:07:53.244788765Z name: etcd-auto-backup-dir 2026-02-16T02:07:53.252369643Z I0216 02:07:53.252311 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-02-16T02:07:53.252604829Z I0216 02:07:53.252563 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-16T02:07:53.252604829Z I0216 02:07:53.252574 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-16T02:07:53.252604829Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-16T02:08:07.444426854Z W0216 02:08:07.444097 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189497fe9babbaba.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:4733c2df-0f5a-4696-b8c6-2568ebc7debc,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-02-16 02:07:53.25265785 +0000 UTC m=+30.780254477,LastTimestamp:2026-02-16 02:07:53.25265785 +0000 UTC m=+30.780254477,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: the server was unable to return a response in the time allotted, but may still be processing the request (post events) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000001615215144476207023511 0ustar00000000000000002026-02-16T02:09:00.359517368Z I0216 02:09:00.359145 1 etcdcli_pool.go:70] creating a new cached client 2026-02-16T02:09:00.361701392Z 2026/02/16 02:09:00 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:00.362071881Z 2026/02/16 02:09:00 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:01.363121388Z 2026/02/16 02:09:01 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:01.363212030Z 2026/02/16 02:09:01 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:02.751317552Z 2026/02/16 02:09:02 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:03.022475862Z 2026/02/16 02:09:03 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:04.820363927Z 2026/02/16 02:09:04 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:05.951514253Z 2026/02/16 02:09:05 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:08.364430674Z 2026/02/16 02:09:08 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:10.359988014Z {"level":"warn","ts":"2026-02-16T02:09:10.359727Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc000a1c1e0/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-02-16T02:09:10.360066336Z E0216 02:09:10.360010 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-02-16T02:09:10.360066336Z E0216 02:09:10.360035 1 rev.go:176] could not reach any endpoint to get the raft index 2026-02-16T02:09:10.361170443Z 2026/02/16 02:09:10 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:11.362339494Z 2026/02/16 02:09:11 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:12.682498142Z 2026/02/16 02:09:12 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:14.897901888Z 2026/02/16 02:09:14 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:15.188882051Z 2026/02/16 02:09:15 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:19.501222346Z 2026/02/16 02:09:19 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:20.360382829Z {"level":"warn","ts":"2026-02-16T02:09:20.360169Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc000a1c1e0/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-02-16T02:09:20.360382829Z E0216 02:09:20.360360 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-02-16T02:09:20.360494792Z E0216 02:09:20.360386 1 rev.go:176] could not reach any endpoint to get the raft index 2026-02-16T02:09:20.362109662Z 2026/02/16 02:09:20 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-16T02:09:21.364487852Z 2026/02/16 02:09:21 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215144476207024203 0ustar00000000000000002026-02-16T02:08:50.051506740Z I0216 02:08:50.051170 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-02-16T02:09:36.481895663Z I0216 02:09:36.481787 1 etcdcli_pool.go:70] creating a new cached client 2026-02-16T02:09:41.484251483Z I0216 02:09:41.484006 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000005771615144476207024376 0ustar00000000000000002026-02-16T02:08:49.634424838Z {"level":"info","ts":"2026-02-16T02:08:49.633991Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-16T02:08:49.635512475Z {"level":"info","ts":"2026-02-16T02:08:49.635391Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-02-16T02:08:49.635978286Z {"level":"info","ts":"2026-02-16T02:08:49.635903Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-16T02:08:49.636123270Z {"level":"info","ts":"2026-02-16T02:08:49.636035Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-02-16T02:08:49.636177951Z {"level":"info","ts":"2026-02-16T02:08:49.636139Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc000218000/192.168.32.10:9978\""} 2026-02-16T02:08:49.636233593Z {"level":"info","ts":"2026-02-16T02:08:49.636193Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc000218000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-02-16T02:08:49.636249803Z {"level":"info","ts":"2026-02-16T02:08:49.636225Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-02-16T02:08:49.636912070Z {"level":"info","ts":"2026-02-16T02:08:49.636819Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-02-16T02:08:49.637012192Z {"level":"info","ts":"2026-02-16T02:08:49.636918Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-02-16T02:08:49.637136755Z {"level":"info","ts":"2026-02-16T02:08:49.637070Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc0000b1740 } }"} 2026-02-16T02:08:49.637161106Z {"level":"info","ts":"2026-02-16T02:08:49.637134Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-02-16T02:08:49.637232108Z {"level":"info","ts":"2026-02-16T02:08:49.637187Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-02-16T02:08:49.637282069Z {"level":"info","ts":"2026-02-16T02:08:49.637218Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-02-16T02:08:49.638889899Z {"level":"info","ts":"2026-02-16T02:08:49.637281Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-16T02:08:49.639050123Z {"level":"info","ts":"2026-02-16T02:08:49.638968Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, CONNECTING"} 2026-02-16T02:08:49.639852583Z {"level":"info","ts":"2026-02-16T02:08:49.639033Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-16T02:08:49.640864688Z {"level":"info","ts":"2026-02-16T02:08:49.640758Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:49.640894288Z {"level":"warn","ts":"2026-02-16T02:08:49.640846Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:49.640938110Z {"level":"info","ts":"2026-02-16T02:08:49.640901Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:49.641018462Z {"level":"info","ts":"2026-02-16T02:08:49.640971Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, TRANSIENT_FAILURE"} 2026-02-16T02:08:49.641034792Z {"level":"info","ts":"2026-02-16T02:08:49.641009Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-02-16T02:08:49.641243057Z {"level":"info","ts":"2026-02-16T02:08:49.641169Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-02-16T02:08:49.641388681Z {"level":"info","ts":"2026-02-16T02:08:49.641338Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-02-16T02:08:49.641830922Z {"level":"info","ts":"2026-02-16T02:08:49.641740Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-02-16T02:08:49.641830922Z {"level":"info","ts":"2026-02-16T02:08:49.641797Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-02-16T02:08:49.641830922Z {"level":"info","ts":"2026-02-16T02:08:49.641812Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-02-16T02:08:49.641871313Z {"level":"info","ts":"2026-02-16T02:08:49.641822Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-02-16T02:08:49.642079348Z {"level":"info","ts":"2026-02-16T02:08:49.642022Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-02-16T02:08:50.641314869Z {"level":"info","ts":"2026-02-16T02:08:50.641149Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:50.641314869Z {"level":"info","ts":"2026-02-16T02:08:50.641258Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, IDLE"} 2026-02-16T02:08:50.641498584Z {"level":"info","ts":"2026-02-16T02:08:50.641314Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-16T02:08:50.641498584Z {"level":"info","ts":"2026-02-16T02:08:50.641362Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-16T02:08:50.641591076Z {"level":"info","ts":"2026-02-16T02:08:50.641506Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, CONNECTING"} 2026-02-16T02:08:50.641978396Z {"level":"info","ts":"2026-02-16T02:08:50.641907Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:50.641978396Z {"level":"warn","ts":"2026-02-16T02:08:50.641956Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:50.642051398Z {"level":"info","ts":"2026-02-16T02:08:50.641997Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:50.642068128Z {"level":"info","ts":"2026-02-16T02:08:50.642037Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, TRANSIENT_FAILURE"} 2026-02-16T02:08:52.427097883Z {"level":"info","ts":"2026-02-16T02:08:52.426933Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:52.427097883Z {"level":"info","ts":"2026-02-16T02:08:52.427048Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, IDLE"} 2026-02-16T02:08:52.427183305Z {"level":"info","ts":"2026-02-16T02:08:52.427110Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-16T02:08:52.427183305Z {"level":"info","ts":"2026-02-16T02:08:52.427158Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-16T02:08:52.427354949Z {"level":"info","ts":"2026-02-16T02:08:52.427292Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, CONNECTING"} 2026-02-16T02:08:52.427728019Z {"level":"info","ts":"2026-02-16T02:08:52.427617Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:52.427749879Z {"level":"warn","ts":"2026-02-16T02:08:52.427714Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:52.427787200Z {"level":"info","ts":"2026-02-16T02:08:52.427762Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:52.427869722Z {"level":"info","ts":"2026-02-16T02:08:52.427811Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, TRANSIENT_FAILURE"} 2026-02-16T02:08:55.246674636Z {"level":"info","ts":"2026-02-16T02:08:55.246520Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:55.246674636Z {"level":"info","ts":"2026-02-16T02:08:55.246647Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, IDLE"} 2026-02-16T02:08:55.246738947Z {"level":"info","ts":"2026-02-16T02:08:55.246683Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-16T02:08:55.246738947Z {"level":"info","ts":"2026-02-16T02:08:55.246713Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-16T02:08:55.246915362Z {"level":"info","ts":"2026-02-16T02:08:55.246842Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, CONNECTING"} 2026-02-16T02:08:55.247038655Z {"level":"info","ts":"2026-02-16T02:08:55.247002Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:55.247048565Z {"level":"warn","ts":"2026-02-16T02:08:55.247032Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:55.247074666Z {"level":"info","ts":"2026-02-16T02:08:55.247056Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:55.247102236Z {"level":"info","ts":"2026-02-16T02:08:55.247084Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, TRANSIENT_FAILURE"} 2026-02-16T02:08:59.946550478Z {"level":"info","ts":"2026-02-16T02:08:59.946363Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:59.946550478Z {"level":"info","ts":"2026-02-16T02:08:59.946522Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, IDLE"} 2026-02-16T02:08:59.946628630Z {"level":"info","ts":"2026-02-16T02:08:59.946569Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-16T02:08:59.946628630Z {"level":"info","ts":"2026-02-16T02:08:59.946614Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-16T02:08:59.946746633Z {"level":"info","ts":"2026-02-16T02:08:59.946674Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, CONNECTING"} 2026-02-16T02:08:59.947067261Z {"level":"info","ts":"2026-02-16T02:08:59.946992Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:59.947080521Z {"level":"warn","ts":"2026-02-16T02:08:59.947060Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:59.947138402Z {"level":"info","ts":"2026-02-16T02:08:59.947102Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:08:59.947177343Z {"level":"info","ts":"2026-02-16T02:08:59.947150Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, TRANSIENT_FAILURE"} 2026-02-16T02:09:06.195755715Z {"level":"info","ts":"2026-02-16T02:09:06.195582Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:09:06.195755715Z {"level":"info","ts":"2026-02-16T02:09:06.195677Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, IDLE"} 2026-02-16T02:09:06.195812387Z {"level":"info","ts":"2026-02-16T02:09:06.195732Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-16T02:09:06.195812387Z {"level":"info","ts":"2026-02-16T02:09:06.195780Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-16T02:09:06.195879718Z {"level":"info","ts":"2026-02-16T02:09:06.195825Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, CONNECTING"} 2026-02-16T02:09:06.196256238Z {"level":"info","ts":"2026-02-16T02:09:06.196188Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:09:06.196256238Z {"level":"warn","ts":"2026-02-16T02:09:06.196232Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:09:06.196302169Z {"level":"info","ts":"2026-02-16T02:09:06.196269Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:09:06.196336630Z {"level":"info","ts":"2026-02-16T02:09:06.196306Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, TRANSIENT_FAILURE"} 2026-02-16T02:09:15.391838378Z {"level":"info","ts":"2026-02-16T02:09:15.391657Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:09:15.391838378Z {"level":"info","ts":"2026-02-16T02:09:15.391772Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, IDLE"} 2026-02-16T02:09:15.391919510Z {"level":"info","ts":"2026-02-16T02:09:15.391820Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-16T02:09:15.391919510Z {"level":"info","ts":"2026-02-16T02:09:15.391866Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-16T02:09:15.392164236Z {"level":"info","ts":"2026-02-16T02:09:15.392067Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, CONNECTING"} 2026-02-16T02:09:15.392356581Z {"level":"info","ts":"2026-02-16T02:09:15.392266Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:09:15.392356581Z {"level":"warn","ts":"2026-02-16T02:09:15.392333Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:09:15.392544916Z {"level":"info","ts":"2026-02-16T02:09:15.392392Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:09:15.392584947Z {"level":"info","ts":"2026-02-16T02:09:15.392498Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, TRANSIENT_FAILURE"} 2026-02-16T02:09:34.169588231Z {"level":"info","ts":"2026-02-16T02:09:34.169492Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-16T02:09:34.169588231Z {"level":"info","ts":"2026-02-16T02:09:34.169570Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, IDLE"} 2026-02-16T02:09:34.169648722Z {"level":"info","ts":"2026-02-16T02:09:34.169606Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-16T02:09:34.169656783Z {"level":"info","ts":"2026-02-16T02:09:34.169646Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-16T02:09:34.170002781Z {"level":"info","ts":"2026-02-16T02:09:34.169747Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, CONNECTING"} 2026-02-16T02:09:34.175508078Z {"level":"info","ts":"2026-02-16T02:09:34.175466Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-02-16T02:09:34.175508078Z {"level":"info","ts":"2026-02-16T02:09:34.175499Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00022a690, READY"} 2026-02-16T02:09:34.175574060Z {"level":"info","ts":"2026-02-16T02:09:34.175548Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-02-16T02:09:34.175574060Z {"level":"info","ts":"2026-02-16T02:09:34.175568Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013463615144476207022727 0ustar00000000000000002026-02-16T02:10:07.555242922Z {"level":"warn","ts":"2026-02-16T02:10:07.555185Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.212519Z","time spent":"342.652895ms","remote":"[::1]:46038","response type":"/etcdserverpb.KV/Range","request count":0,"request size":114,"response count":1,"response size":8935,"request content":"key:\"/kubernetes.io/pods/openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d-b47jp\" "} 2026-02-16T02:10:07.555260022Z {"level":"info","ts":"2026-02-16T02:10:07.555174Z","caller":"traceutil/trace.go:171","msg":"trace[1959003683] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-cluster-storage-operator/prometheus; range_end:; response_count:1; response_revision:10225; }","duration":"117.328362ms","start":"2026-02-16T02:10:07.437806Z","end":"2026-02-16T02:10:07.555135Z","steps":["trace[1959003683] 'agreement among raft nodes before linearized reading' (duration: 117.22732ms)"],"step_count":1} 2026-02-16T02:10:07.555260022Z {"level":"info","ts":"2026-02-16T02:10:07.555239Z","caller":"traceutil/trace.go:171","msg":"trace[559315558] range","detail":"{range_begin:/kubernetes.io/clusterroles/catalogd-metrics-reader; range_end:; response_count:1; response_revision:10225; }","duration":"190.477708ms","start":"2026-02-16T02:10:07.364756Z","end":"2026-02-16T02:10:07.555234Z","steps":["trace[559315558] 'agreement among raft nodes before linearized reading' (duration: 190.459207ms)"],"step_count":1} 2026-02-16T02:10:07.555312854Z {"level":"warn","ts":"2026-02-16T02:10:07.555276Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"443.17589ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts\" limit:1 ","response":"range_response_count:0 size:5"} 2026-02-16T02:10:07.555312854Z {"level":"info","ts":"2026-02-16T02:10:07.555300Z","caller":"traceutil/trace.go:171","msg":"trace[1100049182] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10225; }","duration":"443.232601ms","start":"2026-02-16T02:10:07.112062Z","end":"2026-02-16T02:10:07.555295Z","steps":["trace[1100049182] 'agreement among raft nodes before linearized reading' (duration: 443.19005ms)"],"step_count":1} 2026-02-16T02:10:07.555333674Z {"level":"warn","ts":"2026-02-16T02:10:07.555320Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.112044Z","time spent":"443.271353ms","remote":"[::1]:40018","response type":"/etcdserverpb.KV/Range","request count":0,"request size":34,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/serviceaccounts\" limit:1 "} 2026-02-16T02:10:07.555393226Z {"level":"warn","ts":"2026-02-16T02:10:07.555313Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"302.591061ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiregistration.k8s.io/apiservices/v1.quota.openshift.io\" ","response":"range_response_count:1 size:3437"} 2026-02-16T02:10:07.555393226Z {"level":"warn","ts":"2026-02-16T02:10:07.555356Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"205.702386ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" ","response":"range_response_count:1 size:2512"} 2026-02-16T02:10:07.555411396Z {"level":"info","ts":"2026-02-16T02:10:07.555388Z","caller":"traceutil/trace.go:171","msg":"trace[785806923] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:10225; }","duration":"205.786327ms","start":"2026-02-16T02:10:07.349593Z","end":"2026-02-16T02:10:07.555379Z","steps":["trace[785806923] 'agreement among raft nodes before linearized reading' (duration: 205.717486ms)"],"step_count":1} 2026-02-16T02:10:07.555427567Z {"level":"info","ts":"2026-02-16T02:10:07.555398Z","caller":"traceutil/trace.go:171","msg":"trace[194404661] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.quota.openshift.io; range_end:; response_count:1; response_revision:10225; }","duration":"302.707233ms","start":"2026-02-16T02:10:07.252674Z","end":"2026-02-16T02:10:07.555381Z","steps":["trace[194404661] 'agreement among raft nodes before linearized reading' (duration: 302.520719ms)"],"step_count":1} 2026-02-16T02:10:07.555466088Z {"level":"warn","ts":"2026-02-16T02:10:07.555419Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"367.877211ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/proxies.config.openshift.io\" ","response":"range_response_count:1 size:6476"} 2026-02-16T02:10:07.555500878Z {"level":"info","ts":"2026-02-16T02:10:07.555463Z","caller":"traceutil/trace.go:171","msg":"trace[584585711] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/proxies.config.openshift.io; range_end:; response_count:1; response_revision:10225; }","duration":"367.927772ms","start":"2026-02-16T02:10:07.187525Z","end":"2026-02-16T02:10:07.555453Z","steps":["trace[584585711] 'agreement among raft nodes before linearized reading' (duration: 367.865711ms)"],"step_count":1} 2026-02-16T02:10:07.555500878Z {"level":"warn","ts":"2026-02-16T02:10:07.555068Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"214.683909ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-console\" ","response":"range_response_count:0 size:5"} 2026-02-16T02:10:07.555500878Z {"level":"warn","ts":"2026-02-16T02:10:07.555482Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.187518Z","time spent":"367.958583ms","remote":"[::1]:39852","response type":"/etcdserverpb.KV/Range","request count":0,"request size":91,"response count":1,"response size":6500,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/proxies.config.openshift.io\" "} 2026-02-16T02:10:07.555500878Z {"level":"warn","ts":"2026-02-16T02:10:07.555470Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.252669Z","time spent":"302.758605ms","remote":"[::1]:39812","response type":"/etcdserverpb.KV/Range","request count":0,"request size":73,"response count":1,"response size":3461,"request content":"key:\"/kubernetes.io/apiregistration.k8s.io/apiservices/v1.quota.openshift.io\" "} 2026-02-16T02:10:07.555562210Z {"level":"info","ts":"2026-02-16T02:10:07.555201Z","caller":"traceutil/trace.go:171","msg":"trace[1228728946] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/grafana-dashboard-etcd; range_end:; response_count:0; response_revision:10225; }","duration":"167.519728ms","start":"2026-02-16T02:10:07.387676Z","end":"2026-02-16T02:10:07.555195Z","steps":["trace[1228728946] 'agreement among raft nodes before linearized reading' (duration: 167.481647ms)"],"step_count":1} 2026-02-16T02:10:07.555562210Z {"level":"warn","ts":"2026-02-16T02:10:07.555503Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"281.561018ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-kube-controller-manager/serviceaccount-ca\" ","response":"range_response_count:1 size:7747"} 2026-02-16T02:10:07.555587821Z {"level":"warn","ts":"2026-02-16T02:10:07.555534Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"451.736252ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/cloud-controller-manager\" ","response":"range_response_count:1 size:3618"} 2026-02-16T02:10:07.555607551Z {"level":"info","ts":"2026-02-16T02:10:07.555573Z","caller":"traceutil/trace.go:171","msg":"trace[1183227906] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-kube-controller-manager/serviceaccount-ca; range_end:; response_count:1; response_revision:10225; }","duration":"281.681652ms","start":"2026-02-16T02:10:07.273876Z","end":"2026-02-16T02:10:07.555557Z","steps":["trace[1183227906] 'agreement among raft nodes before linearized reading' (duration: 281.546538ms)"],"step_count":1} 2026-02-16T02:10:07.555626992Z {"level":"warn","ts":"2026-02-16T02:10:07.555586Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"293.524646ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-cloud-credential-operator/prometheus-k8s\" ","response":"range_response_count:1 size:1055"} 2026-02-16T02:10:07.555626992Z {"level":"info","ts":"2026-02-16T02:10:07.555596Z","caller":"traceutil/trace.go:171","msg":"trace[252894857] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/cloud-controller-manager; range_end:; response_count:1; response_revision:10225; }","duration":"451.833684ms","start":"2026-02-16T02:10:07.103749Z","end":"2026-02-16T02:10:07.555582Z","steps":["trace[252894857] 'agreement among raft nodes before linearized reading' (duration: 451.726062ms)"],"step_count":1} 2026-02-16T02:10:07.555661342Z {"level":"warn","ts":"2026-02-16T02:10:07.554994Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"341.218519ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/registry-monitoring\" ","response":"range_response_count:1 size:1232"} 2026-02-16T02:10:07.555661342Z {"level":"warn","ts":"2026-02-16T02:10:07.555618Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"417.615795ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics\" ","response":"range_response_count:1 size:1222"} 2026-02-16T02:10:07.555661342Z {"level":"info","ts":"2026-02-16T02:10:07.555625Z","caller":"traceutil/trace.go:171","msg":"trace[542491822] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-cloud-credential-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10225; }","duration":"293.607407ms","start":"2026-02-16T02:10:07.262008Z","end":"2026-02-16T02:10:07.555616Z","steps":["trace[542491822] 'agreement among raft nodes before linearized reading' (duration: 293.511485ms)"],"step_count":1} 2026-02-16T02:10:07.555661342Z {"level":"warn","ts":"2026-02-16T02:10:07.555635Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.103739Z","time spent":"451.886327ms","remote":"[::1]:40126","response type":"/etcdserverpb.KV/Range","request count":0,"request size":78,"response count":1,"response size":3642,"request content":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/cloud-controller-manager\" "} 2026-02-16T02:10:07.555683873Z {"level":"info","ts":"2026-02-16T02:10:07.555647Z","caller":"traceutil/trace.go:171","msg":"trace[805961448] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics; range_end:; response_count:1; response_revision:10225; }","duration":"417.665267ms","start":"2026-02-16T02:10:07.137972Z","end":"2026-02-16T02:10:07.555638Z","steps":["trace[805961448] 'agreement among raft nodes before linearized reading' (duration: 417.606165ms)"],"step_count":1} 2026-02-16T02:10:07.555683873Z {"level":"warn","ts":"2026-02-16T02:10:07.555629Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"405.211978ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace\" ","response":"range_response_count:1 size:1024"} 2026-02-16T02:10:07.555703303Z {"level":"warn","ts":"2026-02-16T02:10:07.555675Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.137922Z","time spent":"417.744639ms","remote":"[::1]:52762","response type":"/etcdserverpb.KV/Range","request count":0,"request size":101,"response count":1,"response size":1246,"request content":"key:\"/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics\" "} 2026-02-16T02:10:07.555770835Z {"level":"info","ts":"2026-02-16T02:10:07.555717Z","caller":"traceutil/trace.go:171","msg":"trace[361856958] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace; range_end:; response_count:1; response_revision:10225; }","duration":"405.351201ms","start":"2026-02-16T02:10:07.150343Z","end":"2026-02-16T02:10:07.555694Z","steps":["trace[361856958] 'agreement among raft nodes before linearized reading' (duration: 405.179167ms)"],"step_count":1} 2026-02-16T02:10:07.555770835Z {"level":"warn","ts":"2026-02-16T02:10:07.555724Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"318.217839ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/openshiftcontrollermanagers/cluster\" ","response":"range_response_count:1 size:6846"} 2026-02-16T02:10:07.555770835Z {"level":"warn","ts":"2026-02-16T02:10:07.555737Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"338.970573ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-etcd/etcd-master-0\" ","response":"range_response_count:1 size:41407"} 2026-02-16T02:10:07.555797296Z {"level":"warn","ts":"2026-02-16T02:10:07.555763Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.150315Z","time spent":"405.440994ms","remote":"[::1]:40018","response type":"/etcdserverpb.KV/Range","request count":0,"request size":73,"response count":1,"response size":1048,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace\" "} 2026-02-16T02:10:07.555797296Z {"level":"info","ts":"2026-02-16T02:10:07.555141Z","caller":"traceutil/trace.go:171","msg":"trace[181423328] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config/admin-acks; range_end:; response_count:1; response_revision:10225; }","duration":"142.598189ms","start":"2026-02-16T02:10:07.412536Z","end":"2026-02-16T02:10:07.555134Z","steps":["trace[181423328] 'agreement among raft nodes before linearized reading' (duration: 142.570849ms)"],"step_count":1} 2026-02-16T02:10:07.555797296Z {"level":"info","ts":"2026-02-16T02:10:07.555776Z","caller":"traceutil/trace.go:171","msg":"trace[1005804039] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/openshiftcontrollermanagers/cluster; range_end:; response_count:1; response_revision:10225; }","duration":"318.2766ms","start":"2026-02-16T02:10:07.237484Z","end":"2026-02-16T02:10:07.555761Z","steps":["trace[1005804039] 'agreement among raft nodes before linearized reading' (duration: 318.190698ms)"],"step_count":1} 2026-02-16T02:10:07.555816376Z {"level":"warn","ts":"2026-02-16T02:10:07.555789Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"383.461027ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/operator-controller-extension-editor-role\" ","response":"range_response_count:1 size:444"} 2026-02-16T02:10:07.555816376Z {"level":"warn","ts":"2026-02-16T02:10:07.555794Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"439.664503ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-controller-manager-operator/prometheus-k8s\" ","response":"range_response_count:1 size:1188"} 2026-02-16T02:10:07.555837977Z {"level":"info","ts":"2026-02-16T02:10:07.555814Z","caller":"traceutil/trace.go:171","msg":"trace[1504588710] range","detail":"{range_begin:/kubernetes.io/clusterroles/operator-controller-extension-editor-role; range_end:; response_count:1; response_revision:10225; }","duration":"383.501069ms","start":"2026-02-16T02:10:07.172305Z","end":"2026-02-16T02:10:07.555806Z","steps":["trace[1504588710] 'agreement among raft nodes before linearized reading' (duration: 383.453118ms)"],"step_count":1} 2026-02-16T02:10:07.555837977Z {"level":"warn","ts":"2026-02-16T02:10:07.555814Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.237479Z","time spent":"318.323421ms","remote":"[::1]:40434","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":6870,"request content":"key:\"/kubernetes.io/operator.openshift.io/openshiftcontrollermanagers/cluster\" "} 2026-02-16T02:10:07.555861417Z {"level":"info","ts":"2026-02-16T02:10:07.555504Z","caller":"traceutil/trace.go:171","msg":"trace[285568564] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-console; range_end:; response_count:0; response_revision:10225; }","duration":"215.16262ms","start":"2026-02-16T02:10:07.340324Z","end":"2026-02-16T02:10:07.555486Z","steps":["trace[285568564] 'agreement among raft nodes before linearized reading' (duration: 214.691528ms)"],"step_count":1} 2026-02-16T02:10:07.555878538Z {"level":"info","ts":"2026-02-16T02:10:07.555654Z","caller":"traceutil/trace.go:171","msg":"trace[1235296489] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/registry-monitoring; range_end:; response_count:1; response_revision:10225; }","duration":"341.915357ms","start":"2026-02-16T02:10:07.213725Z","end":"2026-02-16T02:10:07.555641Z","steps":["trace[1235296489] 'agreement among raft nodes before linearized reading' (duration: 341.213279ms)"],"step_count":1} 2026-02-16T02:10:07.555878538Z {"level":"warn","ts":"2026-02-16T02:10:07.555850Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.172294Z","time spent":"383.54947ms","remote":"[::1]:33234","response type":"/etcdserverpb.KV/Range","request count":0,"request size":71,"response count":1,"response size":468,"request content":"key:\"/kubernetes.io/clusterroles/operator-controller-extension-editor-role\" "} 2026-02-16T02:10:07.555900278Z {"level":"warn","ts":"2026-02-16T02:10:07.555880Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.213706Z","time spent":"342.164563ms","remote":"[::1]:40190","response type":"/etcdserverpb.KV/Range","request count":0,"request size":56,"response count":1,"response size":1256,"request content":"key:\"/kubernetes.io/clusterrolebindings/registry-monitoring\" "} 2026-02-16T02:10:07.555952170Z {"level":"warn","ts":"2026-02-16T02:10:07.555909Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"455.791123ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:5"} 2026-02-16T02:10:07.555952170Z {"level":"warn","ts":"2026-02-16T02:10:07.555919Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"455.928817ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/kubecontrollermanagers/cluster\" ","response":"range_response_count:1 size:18591"} 2026-02-16T02:10:07.555970970Z {"level":"info","ts":"2026-02-16T02:10:07.555940Z","caller":"traceutil/trace.go:171","msg":"trace[1873560739] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10225; }","duration":"455.821844ms","start":"2026-02-16T02:10:07.100111Z","end":"2026-02-16T02:10:07.555933Z","steps":["trace[1873560739] 'agreement among raft nodes before linearized reading' (duration: 455.776243ms)"],"step_count":1} 2026-02-16T02:10:07.555988501Z {"level":"info","ts":"2026-02-16T02:10:07.555957Z","caller":"traceutil/trace.go:171","msg":"trace[1462675870] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/kubecontrollermanagers/cluster; range_end:; response_count:1; response_revision:10225; }","duration":"455.988527ms","start":"2026-02-16T02:10:07.099958Z","end":"2026-02-16T02:10:07.555946Z","steps":["trace[1462675870] 'agreement among raft nodes before linearized reading' (duration: 455.902725ms)"],"step_count":1} 2026-02-16T02:10:07.556014761Z {"level":"info","ts":"2026-02-16T02:10:07.555819Z","caller":"traceutil/trace.go:171","msg":"trace[1081959143] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-controller-manager-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10225; }","duration":"439.703644ms","start":"2026-02-16T02:10:07.116107Z","end":"2026-02-16T02:10:07.555810Z","steps":["trace[1081959143] 'agreement among raft nodes before linearized reading' (duration: 439.656553ms)"],"step_count":1} 2026-02-16T02:10:07.556065542Z {"level":"warn","ts":"2026-02-16T02:10:07.556027Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"394.487631ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-multus/prometheus-k8s\" ","response":"range_response_count:1 size:567"} 2026-02-16T02:10:07.556065542Z {"level":"warn","ts":"2026-02-16T02:10:07.556027Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.116101Z","time spent":"439.915369ms","remote":"[::1]:52762","response type":"/etcdserverpb.KV/Range","request count":0,"request size":82,"response count":1,"response size":1212,"request content":"key:\"/kubernetes.io/rolebindings/openshift-controller-manager-operator/prometheus-k8s\" "} 2026-02-16T02:10:07.556065542Z {"level":"info","ts":"2026-02-16T02:10:07.556048Z","caller":"traceutil/trace.go:171","msg":"trace[2023267355] range","detail":"{range_begin:/kubernetes.io/roles/openshift-multus/prometheus-k8s; range_end:; response_count:1; response_revision:10225; }","duration":"394.546143ms","start":"2026-02-16T02:10:07.161497Z","end":"2026-02-16T02:10:07.556043Z","steps":["trace[2023267355] 'agreement among raft nodes before linearized reading' (duration: 394.500992ms)"],"step_count":1} 2026-02-16T02:10:07.556086293Z {"level":"warn","ts":"2026-02-16T02:10:07.556067Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.161474Z","time spent":"394.587414ms","remote":"[::1]:40478","response type":"/etcdserverpb.KV/Range","request count":0,"request size":54,"response count":1,"response size":591,"request content":"key:\"/kubernetes.io/roles/openshift-multus/prometheus-k8s\" "} 2026-02-16T02:10:07.556086293Z {"level":"info","ts":"2026-02-16T02:10:07.555778Z","caller":"traceutil/trace.go:171","msg":"trace[2142266633] range","detail":"{range_begin:/kubernetes.io/pods/openshift-etcd/etcd-master-0; range_end:; response_count:1; response_revision:10225; }","duration":"339.019835ms","start":"2026-02-16T02:10:07.216749Z","end":"2026-02-16T02:10:07.555768Z","steps":["trace[2142266633] 'agreement among raft nodes before linearized reading' (duration: 338.935863ms)"],"step_count":1} 2026-02-16T02:10:07.556157015Z {"level":"warn","ts":"2026-02-16T02:10:07.556109Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.216742Z","time spent":"339.355633ms","remote":"[::1]:46038","response type":"/etcdserverpb.KV/Range","request count":0,"request size":50,"response count":1,"response size":41431,"request content":"key:\"/kubernetes.io/pods/openshift-etcd/etcd-master-0\" "} 2026-02-16T02:10:07.556175655Z {"level":"warn","ts":"2026-02-16T02:10:07.555737Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"393.873466ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/credentialsrequests.cloudcredential.openshift.io\" ","response":"range_response_count:1 size:9435"} 2026-02-16T02:10:07.556230106Z {"level":"info","ts":"2026-02-16T02:10:07.556183Z","caller":"traceutil/trace.go:171","msg":"trace[1981771408] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/credentialsrequests.cloudcredential.openshift.io; range_end:; response_count:1; response_revision:10225; }","duration":"394.327587ms","start":"2026-02-16T02:10:07.161845Z","end":"2026-02-16T02:10:07.556172Z","steps":["trace[1981771408] 'agreement among raft nodes before linearized reading' (duration: 393.842755ms)"],"step_count":1} 2026-02-16T02:10:07.556254507Z {"level":"warn","ts":"2026-02-16T02:10:07.556226Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.161840Z","time spent":"394.378458ms","remote":"[::1]:39852","response type":"/etcdserverpb.KV/Range","request count":0,"request size":112,"response count":1,"response size":9459,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/credentialsrequests.cloudcredential.openshift.io\" "} 2026-02-16T02:10:07.556254507Z {"level":"info","ts":"2026-02-16T02:10:07.554890Z","caller":"traceutil/trace.go:171","msg":"trace[793172364] transaction","detail":"{read_only:false; response_revision:10223; number_of_response:1; }","duration":"196.984189ms","start":"2026-02-16T02:10:07.357869Z","end":"2026-02-16T02:10:07.554853Z","steps":["trace[793172364] 'process raft request' (duration: 196.513248ms)"],"step_count":1} 2026-02-16T02:10:07.556272408Z {"level":"warn","ts":"2026-02-16T02:10:07.555964Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.100059Z","time spent":"455.899446ms","remote":"[::1]:46068","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 "} 2026-02-16T02:10:07.556292718Z {"level":"warn","ts":"2026-02-16T02:10:07.555991Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-16T02:10:07.099948Z","time spent":"456.036309ms","remote":"[::1]:33406","response type":"/etcdserverpb.KV/Range","request count":0,"request size":69,"response count":1,"response size":18615,"request content":"key:\"/kubernetes.io/operator.openshift.io/kubecontrollermanagers/cluster\" "} 2026-02-16T02:10:07.686669174Z {"level":"info","ts":"2026-02-16T02:10:07.686191Z","caller":"traceutil/trace.go:171","msg":"trace[1825597624] transaction","detail":"{read_only:false; response_revision:10227; number_of_response:1; }","duration":"120.44389ms","start":"2026-02-16T02:10:07.565726Z","end":"2026-02-16T02:10:07.686170Z","steps":["trace[1825597624] 'process raft request' (duration: 120.398679ms)"],"step_count":1} 2026-02-16T02:10:07.686669174Z {"level":"info","ts":"2026-02-16T02:10:07.686505Z","caller":"traceutil/trace.go:171","msg":"trace[1194152230] transaction","detail":"{read_only:false; response_revision:10226; number_of_response:1; }","duration":"126.242684ms","start":"2026-02-16T02:10:07.560248Z","end":"2026-02-16T02:10:07.686491Z","steps":["trace[1194152230] 'process raft request' (duration: 125.724101ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.686804Z","caller":"traceutil/trace.go:171","msg":"trace[1805803906] linearizableReadLoop","detail":"{readStateIndex:10688; appliedIndex:10687; }","duration":"125.343151ms","start":"2026-02-16T02:10:07.561450Z","end":"2026-02-16T02:10:07.686793Z","steps":["trace[1805803906] 'read index received' (duration: 123.043654ms)","trace[1805803906] 'applied index is now lower than readState.Index' (duration: 2.298547ms)"],"step_count":2} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.686946Z","caller":"traceutil/trace.go:171","msg":"trace[1581329287] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.route.openshift.io; range_end:; response_count:1; response_revision:10227; }","duration":"125.526686ms","start":"2026-02-16T02:10:07.561411Z","end":"2026-02-16T02:10:07.686937Z","steps":["trace[1581329287] 'agreement among raft nodes before linearized reading' (duration: 125.489425ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687085Z","caller":"traceutil/trace.go:171","msg":"trace[436849538] range","detail":"{range_begin:/kubernetes.io/pods/openshift-etcd/etcd-master-0; range_end:; response_count:1; response_revision:10227; }","duration":"115.115197ms","start":"2026-02-16T02:10:07.571958Z","end":"2026-02-16T02:10:07.687073Z","steps":["trace[436849538] 'agreement among raft nodes before linearized reading' (duration: 115.066576ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687142Z","caller":"traceutil/trace.go:171","msg":"trace[958773379] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/machine-api; range_end:; response_count:1; response_revision:10227; }","duration":"121.322581ms","start":"2026-02-16T02:10:07.565790Z","end":"2026-02-16T02:10:07.687113Z","steps":["trace[958773379] 'agreement among raft nodes before linearized reading' (duration: 121.26928ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687237Z","caller":"traceutil/trace.go:171","msg":"trace[1006041639] range","detail":"{range_begin:/kubernetes.io/clusterroles/catalogd-proxy-role; range_end:; response_count:1; response_revision:10227; }","duration":"121.65721ms","start":"2026-02-16T02:10:07.565570Z","end":"2026-02-16T02:10:07.687228Z","steps":["trace[1006041639] 'agreement among raft nodes before linearized reading' (duration: 121.630319ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687280Z","caller":"traceutil/trace.go:171","msg":"trace[294875953] range","detail":"{range_begin:/kubernetes.io/configmaps/kube-system/extension-apiserver-authentication; range_end:; response_count:1; response_revision:10227; }","duration":"124.89128ms","start":"2026-02-16T02:10:07.562368Z","end":"2026-02-16T02:10:07.687260Z","steps":["trace[294875953] 'agreement among raft nodes before linearized reading' (duration: 124.819208ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687398Z","caller":"traceutil/trace.go:171","msg":"trace[723801564] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:10227; }","duration":"121.794653ms","start":"2026-02-16T02:10:07.565592Z","end":"2026-02-16T02:10:07.687387Z","steps":["trace[723801564] 'agreement among raft nodes before linearized reading' (duration: 121.769382ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687511Z","caller":"traceutil/trace.go:171","msg":"trace[1293201803] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-multus/prometheus-k8s; range_end:; response_count:1; response_revision:10227; }","duration":"124.332976ms","start":"2026-02-16T02:10:07.563170Z","end":"2026-02-16T02:10:07.687503Z","steps":["trace[1293201803] 'agreement among raft nodes before linearized reading' (duration: 124.306505ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687503Z","caller":"traceutil/trace.go:171","msg":"trace[668833047] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/csisnapshotcontrollers/cluster; range_end:; response_count:1; response_revision:10227; }","duration":"125.401942ms","start":"2026-02-16T02:10:07.562085Z","end":"2026-02-16T02:10:07.687487Z","steps":["trace[668833047] 'agreement among raft nodes before linearized reading' (duration: 125.31471ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687637Z","caller":"traceutil/trace.go:171","msg":"trace[137890246] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-machine-config-operator/machine-config-daemon; range_end:; response_count:1; response_revision:10227; }","duration":"100.393372ms","start":"2026-02-16T02:10:07.587237Z","end":"2026-02-16T02:10:07.687631Z","steps":["trace[137890246] 'agreement among raft nodes before linearized reading' (duration: 100.375781ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687741Z","caller":"traceutil/trace.go:171","msg":"trace[287401054] range","detail":"{range_begin:/kubernetes.io/replicasets/openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d; range_end:; response_count:1; response_revision:10227; }","duration":"113.771754ms","start":"2026-02-16T02:10:07.573965Z","end":"2026-02-16T02:10:07.687736Z","steps":["trace[287401054] 'agreement among raft nodes before linearized reading' (duration: 113.754143ms)"],"step_count":1} 2026-02-16T02:10:07.689580686Z {"level":"info","ts":"2026-02-16T02:10:07.687745Z","caller":"traceutil/trace.go:171","msg":"trace[910515133] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10227; }","duration":"126.189123ms","start":"2026-02-16T02:10:07.561545Z","end":"2026-02-16T02:10:07.687734Z","steps":["trace[910515133] 'agreement among raft nodes before linearized reading' (duration: 126.168522ms)"],"step_count":1} 2026-02-16T02:10:07.808323574Z {"level":"info","ts":"2026-02-16T02:10:07.808160Z","caller":"traceutil/trace.go:171","msg":"trace[1615542518] linearizableReadLoop","detail":"{readStateIndex:10691; appliedIndex:10690; }","duration":"101.352416ms","start":"2026-02-16T02:10:07.706785Z","end":"2026-02-16T02:10:07.808138Z","steps":["trace[1615542518] 'read index received' (duration: 100.900805ms)","trace[1615542518] 'applied index is now lower than readState.Index' (duration: 450.841µs)"],"step_count":2} 2026-02-16T02:10:07.808532579Z {"level":"info","ts":"2026-02-16T02:10:07.808459Z","caller":"traceutil/trace.go:171","msg":"trace[941905891] transaction","detail":"{read_only:false; response_revision:10229; number_of_response:1; }","duration":"102.125845ms","start":"2026-02-16T02:10:07.706304Z","end":"2026-02-16T02:10:07.808430Z","steps":["trace[941905891] 'process raft request' (duration: 101.424368ms)"],"step_count":1} 2026-02-16T02:10:07.808809546Z {"level":"info","ts":"2026-02-16T02:10:07.808749Z","caller":"traceutil/trace.go:171","msg":"trace[766054931] range","detail":"{range_begin:/kubernetes.io/minions/master-0; range_end:; response_count:1; response_revision:10229; }","duration":"101.979541ms","start":"2026-02-16T02:10:07.706762Z","end":"2026-02-16T02:10:07.808742Z","steps":["trace[766054931] 'agreement among raft nodes before linearized reading' (duration: 101.894079ms)"],"step_count":1} 2026-02-16T02:10:07.810696423Z {"level":"info","ts":"2026-02-16T02:10:07.810576Z","caller":"traceutil/trace.go:171","msg":"trace[1999391127] range","detail":"{range_begin:/kubernetes.io/configmaps/kube-system/extension-apiserver-authentication; range_end:; response_count:1; response_revision:10230; }","duration":"101.603082ms","start":"2026-02-16T02:10:07.708958Z","end":"2026-02-16T02:10:07.810561Z","steps":["trace[1999391127] 'agreement among raft nodes before linearized reading' (duration: 101.578292ms)"],"step_count":1} 2026-02-16T02:10:07.991494670Z {"level":"info","ts":"2026-02-16T02:10:07.991341Z","caller":"traceutil/trace.go:171","msg":"trace[1870741015] transaction","detail":"{read_only:false; response_revision:10234; number_of_response:1; }","duration":"118.953373ms","start":"2026-02-16T02:10:07.872368Z","end":"2026-02-16T02:10:07.991322Z","steps":["trace[1870741015] 'process raft request' (duration: 118.897491ms)"],"step_count":1} 2026-02-16T02:10:07.991494670Z {"level":"info","ts":"2026-02-16T02:10:07.991371Z","caller":"traceutil/trace.go:171","msg":"trace[592313176] linearizableReadLoop","detail":"{readStateIndex:10694; appliedIndex:10693; }","duration":"138.481127ms","start":"2026-02-16T02:10:07.852867Z","end":"2026-02-16T02:10:07.991348Z","steps":["trace[592313176] 'read index received' (duration: 95.87702ms)","trace[592313176] 'applied index is now lower than readState.Index' (duration: 42.602477ms)"],"step_count":2} 2026-02-16T02:10:07.991672074Z {"level":"info","ts":"2026-02-16T02:10:07.991384Z","caller":"traceutil/trace.go:171","msg":"trace[1557674015] transaction","detail":"{read_only:false; response_revision:10233; number_of_response:1; }","duration":"133.730179ms","start":"2026-02-16T02:10:07.857635Z","end":"2026-02-16T02:10:07.991365Z","steps":["trace[1557674015] 'process raft request' (duration: 133.579955ms)"],"step_count":1} 2026-02-16T02:10:07.991672074Z {"level":"info","ts":"2026-02-16T02:10:07.991612Z","caller":"traceutil/trace.go:171","msg":"trace[374693962] range","detail":"{range_begin:/kubernetes.io/pods/openshift-etcd/etcd-master-0; range_end:; response_count:1; response_revision:10234; }","duration":"173.522257ms","start":"2026-02-16T02:10:07.818083Z","end":"2026-02-16T02:10:07.991606Z","steps":["trace[374693962] 'agreement among raft nodes before linearized reading' (duration: 173.432615ms)"],"step_count":1} 2026-02-16T02:10:07.991834898Z {"level":"info","ts":"2026-02-16T02:10:07.991799Z","caller":"traceutil/trace.go:171","msg":"trace[530817188] transaction","detail":"{read_only:false; response_revision:10232; number_of_response:1; }","duration":"169.259681ms","start":"2026-02-16T02:10:07.822532Z","end":"2026-02-16T02:10:07.991792Z","steps":["trace[530817188] 'process raft request' (duration: 126.198973ms)","trace[530817188] 'compare' (duration: 42.246728ms)"],"step_count":2} 2026-02-16T02:10:07.991902860Z {"level":"info","ts":"2026-02-16T02:10:07.991853Z","caller":"traceutil/trace.go:171","msg":"trace[464833324] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.template.openshift.io; range_end:; response_count:1; response_revision:10234; }","duration":"138.828986ms","start":"2026-02-16T02:10:07.853011Z","end":"2026-02-16T02:10:07.991840Z","steps":["trace[464833324] 'agreement among raft nodes before linearized reading' (duration: 138.782974ms)"],"step_count":1} 2026-02-16T02:10:07.991949811Z {"level":"info","ts":"2026-02-16T02:10:07.991907Z","caller":"traceutil/trace.go:171","msg":"trace[1598365250] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/bmceventsubscriptions.metal3.io; range_end:; response_count:1; response_revision:10234; }","duration":"153.817938ms","start":"2026-02-16T02:10:07.838082Z","end":"2026-02-16T02:10:07.991900Z","steps":["trace[1598365250] 'agreement among raft nodes before linearized reading' (duration: 153.796668ms)"],"step_count":1} 2026-02-16T02:10:07.992319150Z {"level":"info","ts":"2026-02-16T02:10:07.992267Z","caller":"traceutil/trace.go:171","msg":"trace[1878692272] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-apiserver-operator/openshift-apiserver-operator; range_end:; response_count:1; response_revision:10234; }","duration":"104.157345ms","start":"2026-02-16T02:10:07.888105Z","end":"2026-02-16T02:10:07.992262Z","steps":["trace[1878692272] 'agreement among raft nodes before linearized reading' (duration: 104.136515ms)"],"step_count":1} 2026-02-16T02:10:07.992480434Z {"level":"info","ts":"2026-02-16T02:10:07.992384Z","caller":"traceutil/trace.go:171","msg":"trace[1443125129] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/aws-ebs-csi-driver-operator; range_end:; response_count:1; response_revision:10234; }","duration":"130.305474ms","start":"2026-02-16T02:10:07.862054Z","end":"2026-02-16T02:10:07.992359Z","steps":["trace[1443125129] 'agreement among raft nodes before linearized reading' (duration: 130.225403ms)"],"step_count":1} 2026-02-16T02:10:07.992716170Z {"level":"info","ts":"2026-02-16T02:10:07.992660Z","caller":"traceutil/trace.go:171","msg":"trace[1616860833] range","detail":"{range_begin:/kubernetes.io/pods/openshift-kube-controller-manager/kube-controller-manager-master-0; range_end:; response_count:1; response_revision:10234; }","duration":"118.235265ms","start":"2026-02-16T02:10:07.874416Z","end":"2026-02-16T02:10:07.992651Z","steps":["trace[1616860833] 'agreement among raft nodes before linearized reading' (duration: 118.202264ms)"],"step_count":1} 2026-02-16T02:10:07.992834663Z {"level":"info","ts":"2026-02-16T02:10:07.992788Z","caller":"traceutil/trace.go:171","msg":"trace[770583190] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10234; }","duration":"126.738826ms","start":"2026-02-16T02:10:07.866044Z","end":"2026-02-16T02:10:07.992783Z","steps":["trace[770583190] 'agreement among raft nodes before linearized reading' (duration: 126.727746ms)"],"step_count":1} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.202110Z","caller":"traceutil/trace.go:171","msg":"trace[788338816] transaction","detail":"{read_only:false; response_revision:10239; number_of_response:1; }","duration":"151.470329ms","start":"2026-02-16T02:10:08.050625Z","end":"2026-02-16T02:10:08.202095Z","steps":["trace[788338816] 'process raft request' (duration: 151.420508ms)"],"step_count":1} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.202231Z","caller":"traceutil/trace.go:171","msg":"trace[1002091874] linearizableReadLoop","detail":"{readStateIndex:10700; appliedIndex:10699; }","duration":"153.624103ms","start":"2026-02-16T02:10:08.048580Z","end":"2026-02-16T02:10:08.202204Z","steps":["trace[1002091874] 'read index received' (duration: 100.360081ms)","trace[1002091874] 'applied index is now lower than readState.Index' (duration: 53.262592ms)"],"step_count":2} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.202363Z","caller":"traceutil/trace.go:171","msg":"trace[907718597] transaction","detail":"{read_only:false; response_revision:10238; number_of_response:1; }","duration":"157.93423ms","start":"2026-02-16T02:10:08.044416Z","end":"2026-02-16T02:10:08.202350Z","steps":["trace[907718597] 'process raft request' (duration: 104.525764ms)","trace[907718597] 'compare' (duration: 53.006136ms)"],"step_count":2} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.202494Z","caller":"traceutil/trace.go:171","msg":"trace[1365948702] range","detail":"{range_begin:/kubernetes.io/pods/openshift-marketplace/community-operators-s95k9; range_end:; response_count:1; response_revision:10239; }","duration":"152.572027ms","start":"2026-02-16T02:10:08.049913Z","end":"2026-02-16T02:10:08.202485Z","steps":["trace[1365948702] 'agreement among raft nodes before linearized reading' (duration: 152.505515ms)"],"step_count":1} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.202630Z","caller":"traceutil/trace.go:171","msg":"trace[528480120] range","detail":"{range_begin:/kubernetes.io/minions/master-0; range_end:; response_count:1; response_revision:10239; }","duration":"154.057663ms","start":"2026-02-16T02:10:08.048566Z","end":"2026-02-16T02:10:08.202624Z","steps":["trace[528480120] 'agreement among raft nodes before linearized reading' (duration: 154.033803ms)"],"step_count":1} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.202774Z","caller":"traceutil/trace.go:171","msg":"trace[1016056382] range","detail":"{range_begin:/kubernetes.io/leases/openshift-controller-manager-operator/openshift-controller-manager-operator-lock; range_end:; response_count:1; response_revision:10239; }","duration":"108.019181ms","start":"2026-02-16T02:10:08.094741Z","end":"2026-02-16T02:10:08.202760Z","steps":["trace[1016056382] 'agreement among raft nodes before linearized reading' (duration: 107.97771ms)"],"step_count":1} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.202821Z","caller":"traceutil/trace.go:171","msg":"trace[173174401] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-network; range_end:; response_count:1; response_revision:10239; }","duration":"114.876681ms","start":"2026-02-16T02:10:08.087936Z","end":"2026-02-16T02:10:08.202813Z","steps":["trace[173174401] 'agreement among raft nodes before linearized reading' (duration: 114.855871ms)"],"step_count":1} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.202937Z","caller":"traceutil/trace.go:171","msg":"trace[377328580] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:10239; }","duration":"128.281184ms","start":"2026-02-16T02:10:08.074650Z","end":"2026-02-16T02:10:08.202931Z","steps":["trace[377328580] 'agreement among raft nodes before linearized reading' (duration: 128.268234ms)"],"step_count":1} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.203039Z","caller":"traceutil/trace.go:171","msg":"trace[1116503492] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-cluster-samples-operator; range_end:; response_count:1; response_revision:10239; }","duration":"140.670022ms","start":"2026-02-16T02:10:08.062363Z","end":"2026-02-16T02:10:08.203033Z","steps":["trace[1116503492] 'agreement among raft nodes before linearized reading' (duration: 140.653211ms)"],"step_count":1} 2026-02-16T02:10:08.203205305Z {"level":"info","ts":"2026-02-16T02:10:08.203153Z","caller":"traceutil/trace.go:171","msg":"trace[599106102] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.apps.openshift.io; range_end:; response_count:1; response_revision:10239; }","duration":"148.135566ms","start":"2026-02-16T02:10:08.055011Z","end":"2026-02-16T02:10:08.203147Z","steps":["trace[599106102] 'agreement among raft nodes before linearized reading' (duration: 148.117466ms)"],"step_count":1} 2026-02-16T02:10:08.203358669Z {"level":"info","ts":"2026-02-16T02:10:08.203270Z","caller":"traceutil/trace.go:171","msg":"trace[1285577093] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-infra/privileged-namespaces-psa-label-syncer; range_end:; response_count:1; response_revision:10239; }","duration":"153.11021ms","start":"2026-02-16T02:10:08.050154Z","end":"2026-02-16T02:10:08.203264Z","steps":["trace[1285577093] 'agreement among raft nodes before linearized reading' (duration: 153.09017ms)"],"step_count":1} 2026-02-16T02:10:08.203456301Z {"level":"info","ts":"2026-02-16T02:10:08.203376Z","caller":"traceutil/trace.go:171","msg":"trace[351689982] range","detail":"{range_begin:/kubernetes.io/daemonsets/openshift-multus/cni-sysctl-allowlist-ds; range_end:; response_count:1; response_revision:10239; }","duration":"153.315345ms","start":"2026-02-16T02:10:08.050055Z","end":"2026-02-16T02:10:08.203371Z","steps":["trace[351689982] 'agreement among raft nodes before linearized reading' (duration: 153.299284ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715144476207023134 0ustar00000000000000002026-02-16T02:08:07.071825676Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-6796f86fd6-qtxkl/oauth-apiserver_current.log0000640000000000000000000004663115144476207031453 0ustar00000000000000002026-02-16T02:09:59.875421906Z I0216 02:09:59.875412 1 flags.go:64] FLAG: --secure-port="8443" 2026-02-16T02:09:59.875421906Z I0216 02:09:59.875415 1 flags.go:64] FLAG: --shutdown-delay-duration="50s" 2026-02-16T02:09:59.875421906Z I0216 02:09:59.875418 1 flags.go:64] FLAG: --shutdown-send-retry-after="true" 2026-02-16T02:09:59.875458587Z I0216 02:09:59.875421 1 flags.go:64] FLAG: --shutdown-watch-termination-grace-period="0s" 2026-02-16T02:09:59.875458587Z I0216 02:09:59.875424 1 flags.go:64] FLAG: --storage-backend="" 2026-02-16T02:09:59.875458587Z I0216 02:09:59.875426 1 flags.go:64] FLAG: --storage-initialization-timeout="1m0s" 2026-02-16T02:09:59.875458587Z I0216 02:09:59.875445 1 flags.go:64] FLAG: --storage-media-type="application/json" 2026-02-16T02:09:59.875458587Z I0216 02:09:59.875449 1 flags.go:64] FLAG: --strict-transport-security-directives="[]" 2026-02-16T02:09:59.875458587Z I0216 02:09:59.875453 1 flags.go:64] FLAG: --tls-cert-file="/var/run/secrets/serving-cert/tls.crt" 2026-02-16T02:09:59.875477328Z I0216 02:09:59.875456 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256]" 2026-02-16T02:09:59.875486848Z I0216 02:09:59.875475 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-16T02:09:59.875486848Z I0216 02:09:59.875478 1 flags.go:64] FLAG: --tls-private-key-file="/var/run/secrets/serving-cert/tls.key" 2026-02-16T02:09:59.875496588Z I0216 02:09:59.875481 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-02-16T02:09:59.875496588Z I0216 02:09:59.875489 1 flags.go:64] FLAG: --tracing-config-file="" 2026-02-16T02:09:59.875496588Z I0216 02:09:59.875492 1 flags.go:64] FLAG: --v="2" 2026-02-16T02:09:59.875506449Z I0216 02:09:59.875495 1 flags.go:64] FLAG: --vmodule="" 2026-02-16T02:09:59.875506449Z I0216 02:09:59.875498 1 flags.go:64] FLAG: --watch-cache="true" 2026-02-16T02:09:59.876338119Z I0216 02:09:59.876104 1 flags.go:64] FLAG: --watch-cache-sizes="[]" 2026-02-16T02:09:59.876338119Z W0216 02:09:59.876179 1 registry.go:345] setting componentGlobalsRegistry in SetFallback. We recommend calling componentGlobalsRegistry.Set() right after parsing flags to avoid using feature gates before their final values are set by the flags. 2026-02-16T02:09:59.876338119Z I0216 02:09:59.876198 1 registry.go:379] setting kube:feature gate emulation version to 1.31 2026-02-16T02:09:59.893650949Z I0216 02:09:59.893406 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T02:10:00.283568997Z I0216 02:10:00.283429 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T02:10:00.287075344Z I0216 02:10:00.286997 1 audit.go:340] Using audit backend: ignoreErrors 2026-02-16T02:10:00.295716418Z I0216 02:10:00.295494 1 shared_informer.go:313] Waiting for caches to sync for *generic.policySource[*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicy,*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicyBinding,k8s.io/apiserver/pkg/admission/plugin/policy/validating.Validator] 2026-02-16T02:10:00.306755282Z I0216 02:10:00.306662 1 plugins.go:157] Loaded 2 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,MutatingAdmissionWebhook. 2026-02-16T02:10:00.306755282Z I0216 02:10:00.306709 1 plugins.go:160] Loaded 2 validating admission controller(s) successfully in the following order: ValidatingAdmissionPolicy,ValidatingAdmissionWebhook. 2026-02-16T02:10:00.307686556Z I0216 02:10:00.307638 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T02:10:00.307697656Z I0216 02:10:00.307681 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T02:10:00.307737857Z I0216 02:10:00.307709 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T02:10:00.307737857Z I0216 02:10:00.307727 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T02:10:00.345360211Z I0216 02:10:00.345281 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T02:10:00.345360211Z I0216 02:10:00.345318 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T02:10:00.345407562Z I0216 02:10:00.345366 1 store.go:1641] "Monitoring resource count at path" resource="oauthclients.oauth.openshift.io" path="//oauth/clients" 2026-02-16T02:10:00.353782450Z I0216 02:10:00.353724 1 cacher.go:463] cacher (oauthclients.oauth.openshift.io): initialized 2026-02-16T02:10:00.353782450Z I0216 02:10:00.353772 1 reflector.go:368] Caches populated for *oauth.OAuthClient from storage/cacher.go:/oauth/clients 2026-02-16T02:10:00.356748603Z I0216 02:10:00.356697 1 store.go:1641] "Monitoring resource count at path" resource="oauthauthorizetokens.oauth.openshift.io" path="//oauth/authorizetokens" 2026-02-16T02:10:00.358080646Z I0216 02:10:00.358008 1 cacher.go:463] cacher (oauthauthorizetokens.oauth.openshift.io): initialized 2026-02-16T02:10:00.358080646Z I0216 02:10:00.358052 1 reflector.go:368] Caches populated for *oauth.OAuthAuthorizeToken from storage/cacher.go:/oauth/authorizetokens 2026-02-16T02:10:00.368136806Z I0216 02:10:00.368088 1 store.go:1641] "Monitoring resource count at path" resource="oauthaccesstokens.oauth.openshift.io" path="//oauth/accesstokens" 2026-02-16T02:10:00.369822088Z I0216 02:10:00.369777 1 cacher.go:463] cacher (oauthaccesstokens.oauth.openshift.io): initialized 2026-02-16T02:10:00.369822088Z I0216 02:10:00.369813 1 reflector.go:368] Caches populated for *oauth.OAuthAccessToken from storage/cacher.go:/oauth/accesstokens 2026-02-16T02:10:00.379083028Z I0216 02:10:00.379046 1 store.go:1641] "Monitoring resource count at path" resource="oauthclientauthorizations.oauth.openshift.io" path="//oauth/clientauthorizations" 2026-02-16T02:10:00.380384770Z I0216 02:10:00.380328 1 cacher.go:463] cacher (oauthclientauthorizations.oauth.openshift.io): initialized 2026-02-16T02:10:00.380384770Z I0216 02:10:00.380375 1 reflector.go:368] Caches populated for *oauth.OAuthClientAuthorization from storage/cacher.go:/oauth/clientauthorizations 2026-02-16T02:10:00.383201720Z I0216 02:10:00.383163 1 handler.go:286] Adding GroupVersion oauth.openshift.io v1 to ResourceManager 2026-02-16T02:10:00.384140143Z I0216 02:10:00.384106 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T02:10:00.384210695Z I0216 02:10:00.384190 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T02:10:00.397756581Z I0216 02:10:00.397720 1 store.go:1641] "Monitoring resource count at path" resource="users.user.openshift.io" path="//users" 2026-02-16T02:10:00.398966691Z I0216 02:10:00.398910 1 cacher.go:463] cacher (users.user.openshift.io): initialized 2026-02-16T02:10:00.398966691Z I0216 02:10:00.398938 1 reflector.go:368] Caches populated for *user.User from storage/cacher.go:/users 2026-02-16T02:10:00.406535039Z I0216 02:10:00.406505 1 store.go:1641] "Monitoring resource count at path" resource="identities.user.openshift.io" path="//useridentities" 2026-02-16T02:10:00.408541519Z I0216 02:10:00.408486 1 cacher.go:463] cacher (identities.user.openshift.io): initialized 2026-02-16T02:10:00.408588070Z I0216 02:10:00.408535 1 reflector.go:368] Caches populated for *user.Identity from storage/cacher.go:/useridentities 2026-02-16T02:10:00.413233155Z I0216 02:10:00.413188 1 store.go:1641] "Monitoring resource count at path" resource="groups.user.openshift.io" path="//groups" 2026-02-16T02:10:00.414362723Z I0216 02:10:00.414329 1 cacher.go:463] cacher (groups.user.openshift.io): initialized 2026-02-16T02:10:00.414476706Z I0216 02:10:00.414424 1 reflector.go:368] Caches populated for *user.Group from storage/cacher.go:/groups 2026-02-16T02:10:00.416631670Z I0216 02:10:00.416561 1 handler.go:286] Adding GroupVersion user.openshift.io v1 to ResourceManager 2026-02-16T02:10:00.416757593Z I0216 02:10:00.416702 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T02:10:00.416757593Z I0216 02:10:00.416726 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T02:10:00.557096296Z I0216 02:10:00.556989 1 genericapiserver.go:570] "[graceful-termination] using HTTP Server shutdown timeout" shutdownTimeout="2s" 2026-02-16T02:10:00.557144587Z I0216 02:10:00.557081 1 genericapiserver.go:538] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T02:10:00.565682859Z I0216 02:10:00.562813 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771207602\" (2026-02-16 02:06:57 +0000 UTC to 2028-02-16 02:06:58 +0000 UTC (now=2026-02-16 02:10:00.562744056 +0000 UTC))" 2026-02-16T02:10:00.565682859Z I0216 02:10:00.562868 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T02:10:00.565682859Z I0216 02:10:00.562928 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T02:10:00.565682859Z I0216 02:10:00.563033 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:10:00.565682859Z I0216 02:10:00.563059 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:10:00.565682859Z I0216 02:10:00.563088 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:10:00.565682859Z I0216 02:10:00.563100 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:10:00.565682859Z I0216 02:10:00.563286 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207800\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207799\" (2026-02-16 01:09:59 +0000 UTC to 2029-02-16 01:09:59 +0000 UTC (now=2026-02-16 02:10:00.563236228 +0000 UTC))" 2026-02-16T02:10:00.565682859Z I0216 02:10:00.563336 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T02:10:00.565682859Z I0216 02:10:00.563392 1 genericapiserver.go:693] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T02:10:00.565682859Z I0216 02:10:00.563480 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T02:10:00.565682859Z I0216 02:10:00.563767 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T02:10:00.567607017Z I0216 02:10:00.567403 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.568194602Z I0216 02:10:00.568119 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.572135259Z I0216 02:10:00.572086 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.572190671Z I0216 02:10:00.572164 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicy from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.573501833Z I0216 02:10:00.572868 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.573501833Z I0216 02:10:00.572917 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.573501833Z I0216 02:10:00.573377 1 reflector.go:368] Caches populated for *v1.OAuthClient from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.574138429Z I0216 02:10:00.573846 1 reflector.go:368] Caches populated for *v1.Group from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.574138429Z I0216 02:10:00.574096 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicyBinding from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.584933847Z I0216 02:10:00.584550 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T02:10:00.596899114Z I0216 02:10:00.596805 1 shared_informer.go:320] Caches are synced for *generic.policySource[*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicy,*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicyBinding,k8s.io/apiserver/pkg/admission/plugin/policy/validating.Validator] 2026-02-16T02:10:00.596899114Z I0216 02:10:00.596839 1 policy_source.go:224] refreshing policies 2026-02-16T02:10:00.663543898Z I0216 02:10:00.663363 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:10:00.663543898Z I0216 02:10:00.663423 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:10:00.663543898Z I0216 02:10:00.663477 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T02:10:00.663679521Z I0216 02:10:00.663635 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2026-02-17 01:56:48 +0000 UTC (now=2026-02-16 02:10:00.66360917 +0000 UTC))" 2026-02-16T02:10:00.663871146Z I0216 02:10:00.663833 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771207602\" (2026-02-16 02:06:57 +0000 UTC to 2028-02-16 02:06:58 +0000 UTC (now=2026-02-16 02:10:00.663812995 +0000 UTC))" 2026-02-16T02:10:00.663992539Z I0216 02:10:00.663956 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207800\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207799\" (2026-02-16 01:09:59 +0000 UTC to 2029-02-16 01:09:59 +0000 UTC (now=2026-02-16 02:10:00.663939628 +0000 UTC))" 2026-02-16T02:10:00.664115972Z I0216 02:10:00.664081 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 01:50:24 +0000 UTC to 2036-02-14 01:50:24 +0000 UTC (now=2026-02-16 02:10:00.66404173 +0000 UTC))" 2026-02-16T02:10:00.664115972Z I0216 02:10:00.664103 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2026-02-17 01:56:50 +0000 UTC (now=2026-02-16 02:10:00.664093862 +0000 UTC))" 2026-02-16T02:10:00.664133913Z I0216 02:10:00.664117 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2027-02-16 01:56:50 +0000 UTC (now=2026-02-16 02:10:00.664109572 +0000 UTC))" 2026-02-16T02:10:00.664149963Z I0216 02:10:00.664133 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2027-02-16 01:56:50 +0000 UTC (now=2026-02-16 02:10:00.664123092 +0000 UTC))" 2026-02-16T02:10:00.664165674Z I0216 02:10:00.664146 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2036-02-14 01:56:48 +0000 UTC (now=2026-02-16 02:10:00.664138233 +0000 UTC))" 2026-02-16T02:10:00.664165674Z I0216 02:10:00.664159 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2026-02-17 01:56:48 +0000 UTC (now=2026-02-16 02:10:00.664152343 +0000 UTC))" 2026-02-16T02:10:00.664322707Z I0216 02:10:00.664271 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771207602\" (2026-02-16 02:06:57 +0000 UTC to 2028-02-16 02:06:58 +0000 UTC (now=2026-02-16 02:10:00.664260546 +0000 UTC))" 2026-02-16T02:10:00.664409940Z I0216 02:10:00.664385 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207800\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207799\" (2026-02-16 01:09:59 +0000 UTC to 2029-02-16 01:09:59 +0000 UTC (now=2026-02-16 02:10:00.664374489 +0000 UTC))" 2026-02-16T02:10:01.605964780Z I0216 02:10:01.605891 1 policy_source.go:224] refreshing policies config/pod/openshift-oauth-apiserver/apiserver-6796f86fd6-qtxkl.json0000640000000000000000000002431215144476207024007 0ustar0000000000000000{"metadata":{"name":"apiserver-6796f86fd6-qtxkl","generateName":"apiserver-6796f86fd6-","namespace":"openshift-oauth-apiserver","uid":"22739961-e322-47f1-b232-eaa4cc35319c","resourceVersion":"9464","creationTimestamp":"2026-02-16T02:07:12Z","labels":{"apiserver":"true","app":"openshift-oauth-apiserver","oauth-apiserver-anti-affinity":"true","pod-template-hash":"6796f86fd6","revision":"1"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.69/23\"],\"mac_address\":\"0a:58:0a:80:00:45\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.69/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","operator.openshift.io/dep-openshift-oauth-apiserver.etcd-client.secret":"VtKg0A==","operator.openshift.io/dep-openshift-oauth-apiserver.etcd-serving-ca.configmap":"cz6M7Q=="},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"apiserver-6796f86fd6","uid":"68594485-7d3e-4f5f-82b3-721191a4139b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"audit-policies","configMap":{"name":"audit-1","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"etcd-serving-ca","configMap":{"name":"etcd-serving-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"encryption-config","secret":{"secretName":"encryption-config-1","defaultMode":420,"optional":true}},{"name":"audit-dir","hostPath":{"path":"/var/log/oauth-apiserver","type":""}},{"name":"kube-api-access-9n58j","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"fix-audit-permissions","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","command":["sh","-c","chmod 0700 /var/log/oauth-apiserver \u0026\u0026 touch /var/log/oauth-apiserver/audit.log \u0026\u0026 chmod 0600 /var/log/oauth-apiserver/*"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-9n58j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"containers":[{"name":"oauth-apiserver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec oauth-apiserver start \\\n --secure-port=8443 \\\n --audit-log-path=/var/log/oauth-apiserver/audit.log \\\n --audit-log-format=json \\\n --audit-log-maxsize=100 \\\n --audit-log-maxbackup=10 \\\n --audit-policy-file=/var/run/configmaps/audit/policy.yaml \\\n --etcd-cafile=/var/run/configmaps/etcd-serving-ca/ca-bundle.crt \\\n --etcd-keyfile=/var/run/secrets/etcd-client/tls.key \\\n --etcd-certfile=/var/run/secrets/etcd-client/tls.crt \\\n --etcd-healthcheck-timeout=9s \\\n --etcd-readycheck-timeout=9s \\\n --shutdown-delay-duration=50s \\\n --shutdown-send-retry-after=true \\\n --tls-private-key-file=/var/run/secrets/serving-cert/tls.key \\\n --tls-cert-file=/var/run/secrets/serving-cert/tls.crt \\\n --enable-priority-and-fairness=false \\\n --api-audiences=https://kubernetes.default.svc \\\n --cors-allowed-origins='//127\\.0\\.0\\.1(:|$)' \\\n --cors-allowed-origins='//localhost(:|$)' \\\n --etcd-servers=https://192.168.32.10:2379 \\\n --tls-cipher-suites=TLS_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_CHACHA20_POLY1305_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version=VersionTLS12 \\\n --v=2\n"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"150m","memory":"200Mi"}},"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"etcd-serving-ca","mountPath":"/var/run/configmaps/etcd-serving-ca"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"encryption-config","mountPath":"/var/run/secrets/encryption-config"},{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-9n58j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"livez?exclude=etcd","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"readyz?exclude=etcd\u0026exclude=etcd-readiness","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"livez","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":30},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Always","terminationGracePeriodSeconds":120,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"oauth-apiserver-sa","serviceAccount":"oauth-apiserver-sa","nodeName":"master-0","securityContext":{},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"apiserver":"true","app":"openshift-oauth-apiserver","oauth-apiserver-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:58Z"},{"type":"Initialized","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:58Z","reason":"ContainersNotInitialized","message":"containers with incomplete status: [fix-audit-permissions]"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:58Z","reason":"ContainersNotReady","message":"containers with unready status: [oauth-apiserver]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:58Z","reason":"ContainersNotReady","message":"containers with unready status: [oauth-apiserver]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:58Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T02:09:58Z","initContainerStatuses":[{"name":"fix-audit-permissions","state":{"waiting":{"reason":"PodInitializing"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","imageID":"","started":false,"volumeMounts":[{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-9n58j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"oauth-apiserver","state":{"waiting":{"reason":"PodInitializing"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","imageID":"","started":false,"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"etcd-serving-ca","mountPath":"/var/run/configmaps/etcd-serving-ca"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"encryption-config","mountPath":"/var/run/secrets/encryption-config"},{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-9n58j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress/router-default-864ddd5f56-ffptx.json0000640000000000000000000001534115144476207023337 0ustar0000000000000000{"metadata":{"name":"router-default-864ddd5f56-ffptx","generateName":"router-default-864ddd5f56-","namespace":"openshift-ingress","uid":"17390d9a-148d-4927-a831-5bc4873c43d5","resourceVersion":"6258","creationTimestamp":"2026-02-16T02:07:06Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"575d6c6cf5","pod-template-hash":"864ddd5f56"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-864ddd5f56","uid":"956c3a0f-e306-41e0-91d2-2b5e5b284ac3","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-85sdg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-85sdg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["575d6c6cf5"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:07Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062615144476207037244 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-bngv92026-02-16T02:09:32.830292279Z Copying system trust bundle 2026-02-16T02:09:32.918891238Z W0216 02:09:32.918792 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-16T02:09:32.919367680Z I0216 02:09:32.919332 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T02:09:32.919398421Z I0216 02:09:32.919364 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T02:09:32.920537079Z I0216 02:09:32.920493 1 observer_polling.go:159] Starting file observer 2026-02-16T02:09:32.920584590Z I0216 02:09:32.920553 1 observer_polling.go:159] Starting file observer 2026-02-16T02:09:35.891508209Z I0216 02:09:35.888208 1 builder.go:304] cluster-authentication-operator version - 2026-02-16T02:09:35.891508209Z I0216 02:09:35.889075 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T02:09:50.693537870Z I0216 02:09:50.690692 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T02:09:50.711685340Z I0216 02:09:50.709626 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T02:09:50.711685340Z I0216 02:09:50.709675 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T02:09:50.711685340Z I0216 02:09:50.709714 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T02:09:50.711685340Z I0216 02:09:50.709729 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T02:09:50.736114067Z I0216 02:09:50.733711 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T02:09:50.736114067Z W0216 02:09:50.733854 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:09:50.736114067Z W0216 02:09:50.733865 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T02:09:50.736114067Z W0216 02:09:50.733873 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T02:09:50.736114067Z W0216 02:09:50.733878 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T02:09:50.736114067Z W0216 02:09:50.733882 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T02:09:50.736114067Z W0216 02:09:50.733887 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T02:09:50.736114067Z I0216 02:09:50.733783 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T02:09:50.736114067Z I0216 02:09:50.736047 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T02:09:50.738961957Z I0216 02:09:50.736480 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-02-16T02:09:50.756011931Z I0216 02:09:50.755835 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771207602\" (2026-02-16 02:06:44 +0000 UTC to 2028-02-16 02:06:45 +0000 UTC (now=2026-02-16 02:09:50.755801675 +0000 UTC))" 2026-02-16T02:09:50.756011931Z I0216 02:09:50.755988 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207776\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207776\" (2026-02-16 01:09:35 +0000 UTC to 2027-02-16 01:09:35 +0000 UTC (now=2026-02-16 02:09:50.755965759 +0000 UTC))" 2026-02-16T02:09:50.756011931Z I0216 02:09:50.756005 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T02:09:50.756076662Z I0216 02:09:50.756028 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T02:09:50.756190175Z I0216 02:09:50.756155 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T02:09:50.756303708Z I0216 02:09:50.756277 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T02:09:50.756314868Z I0216 02:09:50.756308 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T02:09:50.756352119Z I0216 02:09:50.756317 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T02:09:50.756468502Z I0216 02:09:50.756418 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:09:50.756468502Z I0216 02:09:50.756454 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:50.757877707Z I0216 02:09:50.757836 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:09:50.762377019Z I0216 02:09:50.757897 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:50.762377019Z I0216 02:09:50.757961 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T02:09:50.762377019Z I0216 02:09:50.757983 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T02:09:50.762377019Z I0216 02:09:50.761178 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T02:09:50.762377019Z I0216 02:09:50.761324 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T02:09:50.772056189Z I0216 02:09:50.771984 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-02-16T02:09:50.859037808Z I0216 02:09:50.858989 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T02:09:50.859402767Z I0216 02:09:50.859367 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T02:09:50.859464138Z I0216 02:09:50.859426 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T02:09:50.859647873Z I0216 02:09:50.859621 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2026-02-17 01:56:48 +0000 UTC (now=2026-02-16 02:09:50.859597852 +0000 UTC))" 2026-02-16T02:09:50.859779846Z I0216 02:09:50.859756 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771207602\" (2026-02-16 02:06:44 +0000 UTC to 2028-02-16 02:06:45 +0000 UTC (now=2026-02-16 02:09:50.859743525 +0000 UTC))" 2026-02-16T02:09:50.862301259Z I0216 02:09:50.861358 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207776\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207776\" (2026-02-16 01:09:35 +0000 UTC to 2027-02-16 01:09:35 +0000 UTC (now=2026-02-16 02:09:50.861339915 +0000 UTC))" 2026-02-16T02:09:50.862301259Z I0216 02:09:50.861690 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 01:50:24 +0000 UTC to 2036-02-14 01:50:24 +0000 UTC (now=2026-02-16 02:09:50.861675173 +0000 UTC))" 2026-02-16T02:09:50.862301259Z I0216 02:09:50.861778 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2026-02-17 01:56:50 +0000 UTC (now=2026-02-16 02:09:50.861765135 +0000 UTC))" 2026-02-16T02:09:50.862301259Z I0216 02:09:50.861792 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2027-02-16 01:56:50 +0000 UTC (now=2026-02-16 02:09:50.861784386 +0000 UTC))" 2026-02-16T02:09:50.862301259Z I0216 02:09:50.861809 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 01:56:50 +0000 UTC to 2027-02-16 01:56:50 +0000 UTC (now=2026-02-16 02:09:50.861797196 +0000 UTC))" 2026-02-16T02:09:50.862301259Z I0216 02:09:50.861821 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2036-02-14 01:56:48 +0000 UTC (now=2026-02-16 02:09:50.861813177 +0000 UTC))" 2026-02-16T02:09:50.862301259Z I0216 02:09:50.861833 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 01:56:48 +0000 UTC to 2026-02-17 01:56:48 +0000 UTC (now=2026-02-16 02:09:50.861825417 +0000 UTC))" 2026-02-16T02:09:50.862301259Z I0216 02:09:50.862010 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771207602\" (2026-02-16 02:06:44 +0000 UTC to 2028-02-16 02:06:45 +0000 UTC (now=2026-02-16 02:09:50.861994311 +0000 UTC))" 2026-02-16T02:09:50.862301259Z I0216 02:09:50.862187 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771207776\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771207776\" (2026-02-16 01:09:35 +0000 UTC to 2027-02-16 01:09:35 +0000 UTC (now=2026-02-16 02:09:50.862167775 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000003604415144476207037436 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-bngv92026-02-16T02:08:00.814467007Z I0216 02:08:00.814430 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-02-16T02:08:00.814489718Z I0216 02:08:00.814465 1 base_controller.go:123] Shutting down worker of oauth-server controller ... 2026-02-16T02:08:00.814489718Z I0216 02:08:00.814478 1 base_controller.go:113] All oauth-server workers have been terminated 2026-02-16T02:08:00.814489718Z I0216 02:08:00.814479 1 base_controller.go:181] Shutting down OpenshiftAuthenticationStaticResources-StaticResources ... 2026-02-16T02:08:00.814507598Z I0216 02:08:00.814478 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorController controller ... 2026-02-16T02:08:00.814507598Z I0216 02:08:00.814496 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-16T02:08:00.814523468Z I0216 02:08:00.814505 1 base_controller.go:181] Shutting down StatusSyncer_authentication ... 2026-02-16T02:08:00.814523468Z I0216 02:08:00.814511 1 base_controller.go:123] Shutting down worker of RouterCertsDomainValidationController controller ... 2026-02-16T02:08:00.814523468Z I0216 02:08:00.814514 1 base_controller.go:159] All StatusSyncer_authentication post start hooks have been terminated 2026-02-16T02:08:00.814540319Z I0216 02:08:00.814520 1 base_controller.go:113] All RouterCertsDomainValidationController workers have been terminated 2026-02-16T02:08:00.814540319Z I0216 02:08:00.814432 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-02-16T02:08:00.814540319Z I0216 02:08:00.814531 1 base_controller.go:181] Shutting down openshift-authentication-ServiceCA ... 2026-02-16T02:08:00.814564769Z I0216 02:08:00.814518 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T02:08:00.814564769Z I0216 02:08:00.814543 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-02-16T02:08:00.814580540Z I0216 02:08:00.814562 1 base_controller.go:181] Shutting down OAuthServerServiceEndpointsEndpointAccessibleController ... 2026-02-16T02:08:00.814596490Z I0216 02:08:00.814579 1 base_controller.go:181] Shutting down OAuthServerServiceEndpointAccessibleController ... 2026-02-16T02:08:00.814596490Z I0216 02:08:00.814592 1 base_controller.go:181] Shutting down WebhookAuthenticatorCertApprover_OpenShiftAuthenticator ... 2026-02-16T02:08:00.814612461Z I0216 02:08:00.814596 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-02-16T02:08:00.814627831Z I0216 02:08:00.814613 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-02-16T02:08:00.814627831Z I0216 02:08:00.814619 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-02-16T02:08:00.814647391Z I0216 02:08:00.814625 1 base_controller.go:181] Shutting down TrustDistributionController ... 2026-02-16T02:08:00.814662472Z I0216 02:08:00.814626 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-16T02:08:00.814677602Z I0216 02:08:00.814648 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-02-16T02:08:00.814692923Z I0216 02:08:00.814674 1 genericapiserver.go:640] [graceful-termination] in-flight non long-running request(s) have drained 2026-02-16T02:08:00.814692923Z I0216 02:08:00.814682 1 base_controller.go:123] Shutting down worker of TrustDistributionController controller ... 2026-02-16T02:08:00.814708693Z I0216 02:08:00.814692 1 base_controller.go:113] All TrustDistributionController workers have been terminated 2026-02-16T02:08:00.814723773Z I0216 02:08:00.814708 1 genericapiserver.go:681] "[graceful-termination] shutdown event" name="InFlightRequestsDrained" 2026-02-16T02:08:00.814738924Z I0216 02:08:00.814710 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-02-16T02:08:00.814754154Z I0216 02:08:00.814735 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-02-16T02:08:00.814803585Z I0216 02:08:00.814759 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1060342376/tls.crt::/tmp/serving-cert-1060342376/tls.key" 2026-02-16T02:08:00.814803585Z I0216 02:08:00.814771 1 base_controller.go:113] All WebhookAuthenticatorController workers have been terminated 2026-02-16T02:08:00.814821316Z I0216 02:08:00.814800 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T02:08:00.814836556Z I0216 02:08:00.814820 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-02-16T02:08:00.814880617Z I0216 02:08:00.814846 1 base_controller.go:123] Shutting down worker of OpenShiftAuthenticatorCertRequester controller ... 2026-02-16T02:08:00.814880617Z I0216 02:08:00.814869 1 base_controller.go:113] All OpenShiftAuthenticatorCertRequester workers have been terminated 2026-02-16T02:08:00.814902908Z I0216 02:08:00.814885 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-02-16T02:08:00.814902908Z I0216 02:08:00.814895 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressState controller ... 2026-02-16T02:08:00.814919128Z I0216 02:08:00.814903 1 base_controller.go:113] All openshift-authentication-IngressState workers have been terminated 2026-02-16T02:08:00.814919128Z I0216 02:08:00.814905 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-02-16T02:08:00.814934679Z I0216 02:08:00.814917 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-02-16T02:08:00.814934679Z I0216 02:08:00.814926 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-02-16T02:08:00.814950169Z I0216 02:08:00.814939 1 base_controller.go:123] Shutting down worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2026-02-16T02:08:00.814965119Z I0216 02:08:00.814950 1 base_controller.go:113] All OpenshiftAuthenticationStaticResources-StaticResources workers have been terminated 2026-02-16T02:08:00.814965119Z I0216 02:08:00.814960 1 base_controller.go:123] Shutting down worker of StatusSyncer_authentication controller ... 2026-02-16T02:08:00.814980600Z I0216 02:08:00.814968 1 base_controller.go:113] All StatusSyncer_authentication workers have been terminated 2026-02-16T02:08:00.814995470Z I0216 02:08:00.814981 1 base_controller.go:123] Shutting down worker of openshift-authentication-ServiceCA controller ... 2026-02-16T02:08:00.814995470Z I0216 02:08:00.814989 1 base_controller.go:113] All openshift-authentication-ServiceCA workers have been terminated 2026-02-16T02:08:00.815034751Z I0216 02:08:00.815009 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointsEndpointAccessibleController controller ... 2026-02-16T02:08:00.815034751Z I0216 02:08:00.815023 1 base_controller.go:113] All OAuthServerServiceEndpointsEndpointAccessibleController workers have been terminated 2026-02-16T02:08:00.815052032Z I0216 02:08:00.815033 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionCondition ... 2026-02-16T02:08:00.815052032Z I0216 02:08:00.815035 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointAccessibleController controller ... 2026-02-16T02:08:00.815052032Z I0216 02:08:00.815041 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ... 2026-02-16T02:08:00.815068972Z I0216 02:08:00.815053 1 base_controller.go:113] All OAuthServerServiceEndpointAccessibleController workers have been terminated 2026-02-16T02:08:00.815068972Z I0216 02:08:00.815057 1 base_controller.go:113] All WebhookAuthenticatorCertApprover_OpenShiftAuthenticator workers have been terminated 2026-02-16T02:08:00.815084702Z I0216 02:08:00.815072 1 base_controller.go:181] Shutting down OAuthAPIServerController-WorkloadWorkloadController ... 2026-02-16T02:08:00.815084702Z I0216 02:08:00.814851 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-02-16T02:08:00.815130153Z I0216 02:08:00.815095 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionCondition controller ... 2026-02-16T02:08:00.815146434Z I0216 02:08:00.815105 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionCondition workers have been terminated 2026-02-16T02:08:00.815146434Z I0216 02:08:00.815103 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-02-16T02:08:00.815146434Z I0216 02:08:00.815118 1 base_controller.go:123] Shutting down worker of OAuthAPIServerController-WorkloadWorkloadController controller ... 2026-02-16T02:08:00.815146434Z I0216 02:08:00.815126 1 base_controller.go:113] All OAuthAPIServerController-WorkloadWorkloadController workers have been terminated 2026-02-16T02:08:00.815146434Z I0216 02:08:00.815130 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ... 2026-02-16T02:08:00.815171884Z I0216 02:08:00.815149 1 base_controller.go:181] Shutting down openshift-authentication-IngressNodesAvailable ... 2026-02-16T02:08:00.815171884Z I0216 02:08:00.815154 1 base_controller.go:113] All NamespaceFinalizerController_openshift-oauth-apiserver workers have been terminated 2026-02-16T02:08:00.815171884Z I0216 02:08:00.815161 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionPrune controller ... 2026-02-16T02:08:00.815171884Z I0216 02:08:00.815165 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionState ... 2026-02-16T02:08:00.815189995Z I0216 02:08:00.815151 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionPrune ... 2026-02-16T02:08:00.815189995Z I0216 02:08:00.815176 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressNodesAvailable controller ... 2026-02-16T02:08:00.815189995Z I0216 02:08:00.815178 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionPrune workers have been terminated 2026-02-16T02:08:00.815189995Z I0216 02:08:00.815185 1 base_controller.go:113] All openshift-authentication-IngressNodesAvailable workers have been terminated 2026-02-16T02:08:00.815207525Z I0216 02:08:00.815194 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionMigration ... 2026-02-16T02:08:00.815207525Z I0216 02:08:00.815196 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionState controller ... 2026-02-16T02:08:00.815223656Z I0216 02:08:00.815200 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-02-16T02:08:00.815223656Z I0216 02:08:00.815205 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionState workers have been terminated 2026-02-16T02:08:00.815223656Z I0216 02:08:00.815214 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionMigration controller ... 2026-02-16T02:08:00.815240496Z I0216 02:08:00.815208 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionKey ... 2026-02-16T02:08:00.815240496Z I0216 02:08:00.815221 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionKey controller ... 2026-02-16T02:08:00.815240496Z I0216 02:08:00.815230 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionMigration workers have been terminated 2026-02-16T02:08:00.815240496Z I0216 02:08:00.815235 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionKey workers have been terminated 2026-02-16T02:08:00.815257987Z I0216 02:08:00.815221 1 builder.go:335] server exited 2026-02-16T02:08:00.815257987Z I0216 02:08:00.815250 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-16T02:08:00.815273487Z I0216 02:08:00.815258 1 base_controller.go:181] Shutting down authentication-ManagementState ... 2026-02-16T02:08:00.815327548Z I0216 02:08:00.815299 1 base_controller.go:181] Shutting down openshift-authentication-RemoveStaleConditions ... 2026-02-16T02:08:00.815327548Z I0216 02:08:00.814763 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-02-16T02:08:00.815327548Z I0216 02:08:00.815320 1 base_controller.go:181] Shutting down openshift-authentication-UnsupportedConfigOverrides ... 2026-02-16T02:08:00.815346889Z I0216 02:08:00.815332 1 base_controller.go:113] All RevisionController workers have been terminated 2026-02-16T02:08:00.815346889Z I0216 02:08:00.815341 1 base_controller.go:123] Shutting down worker of openshift-authentication-RemoveStaleConditions controller ... 2026-02-16T02:08:00.815363229Z I0216 02:08:00.815347 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-02-16T02:08:00.815363229Z I0216 02:08:00.815352 1 base_controller.go:113] All openshift-authentication-RemoveStaleConditions workers have been terminated 2026-02-16T02:08:00.815379420Z I0216 02:08:00.815359 1 base_controller.go:123] Shutting down worker of openshift-authentication-UnsupportedConfigOverrides controller ... 2026-02-16T02:08:00.815379420Z I0216 02:08:00.815370 1 base_controller.go:113] All openshift-authentication-UnsupportedConfigOverrides workers have been terminated 2026-02-16T02:08:00.815379420Z I0216 02:08:00.815334 1 base_controller.go:123] Shutting down worker of authentication-ManagementState controller ... 2026-02-16T02:08:00.815396270Z I0216 02:08:00.815381 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-02-16T02:08:00.815396270Z I0216 02:08:00.815383 1 base_controller.go:113] All authentication-ManagementState workers have been terminated 2026-02-16T02:08:00.815412000Z I0216 02:08:00.815396 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-02-16T02:08:00.818021185Z I0216 02:08:00.817981 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-02-16T02:08:00.818092437Z I0216 02:08:00.818071 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-16T02:08:05.846756649Z I0216 02:08:05.846320 1 observer_polling.go:162] Shutting down file observer 2026-02-16T02:08:34.826973241Z E0216 02:08:34.826823 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-16T02:08:34.826973241Z W0216 02:08:34.826896 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-755d954778-bngv9.json0000640000000000000000000001607615144476207030140 0ustar0000000000000000{"metadata":{"name":"authentication-operator-755d954778-bngv9","generateName":"authentication-operator-755d954778-","namespace":"openshift-authentication-operator","uid":"c9cd32bc-a13a-44ee-ba52-7bb335c7007b","resourceVersion":"9265","creationTimestamp":"2026-02-16T02:05:16Z","labels":{"app":"authentication-operator","pod-template-hash":"755d954778"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-755d954778","uid":"865953cd-a632-4b9c-a5b6-2b7be3f8943f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-xr7gn","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.32_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-xr7gn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c5"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:33Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:33Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-02-16T02:06:28Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-02-16T02:09:32Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T02:06:40Z","finishedAt":"2026-02-16T02:08:34Z","containerID":"cri-o://3c59868e46c60a0139fbb9feace033d7ff3288c7e5f3febf6586656bff57983b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","containerID":"cri-o://00959d2f0302d7424610700e0682f887d9314d52514346143681e4644ccabd4b","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-xr7gn","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003625515144476207020661 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:01:45Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:01:56Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-5c696dbdcd to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:01:58Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-6b56bd877c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:01:58Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-588944557d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:01:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-6b56bd877c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:01:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-588944557d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:01:59Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c696dbdcd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:05:10Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:05:13Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-6b56bd877c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:05:13Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-588944557d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:05:15Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-588944557d-2z8fq","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:05:15Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c696dbdcd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:05:16Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-6b56bd877c-qwp9g","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:05:18Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-5c696dbdcd-tkqng","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:06:32Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:06:32Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:06:32Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:06:53Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:06:53Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:06:53Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:12Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.5/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:12Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:12Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:20Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 8.597s (8.597s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:20Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 8.441s (8.441s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:21Z","reason":"LeaderElection","message":"package-server-manager-5c696dbdcd-tkqng_6dd9fbc2-bd44-4ed8-8f7a-629af7508324 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 8.488s (8.488s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:23Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:48Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-87777c9b7 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:48Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:48Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:48Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:07:48Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-87777c9b7-fxzh6","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:08:54Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_packageserver-87777c9b7-fxzh6_openshift-operator-lifecycle-manager_dc3354cb-b6c3-40a5-a695-cccb079ad292_0(da95de67fb0edb5fb8df64ae73b9f1edf43efdd11e844bf8acfb0e130cf27042): error adding pod openshift-operator-lifecycle-manager_packageserver-87777c9b7-fxzh6 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"da95de67fb0edb5fb8df64ae73b9f1edf43efdd11e844bf8acfb0e130cf27042\" Netns:\"/var/run/netns/815f194d-aa81-40db-8fad-e5e827139425\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=packageserver-87777c9b7-fxzh6;K8S_POD_INFRA_CONTAINER_ID=da95de67fb0edb5fb8df64ae73b9f1edf43efdd11e844bf8acfb0e130cf27042;K8S_POD_UID=dc3354cb-b6c3-40a5-a695-cccb079ad292\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/packageserver-87777c9b7-fxzh6] networking: Multus: [openshift-operator-lifecycle-manager/packageserver-87777c9b7-fxzh6/dc3354cb-b6c3-40a5-a695-cccb079ad292]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod packageserver-87777c9b7-fxzh6 in out of cluster comm: SetNetworkStatus: failed to update the pod packageserver-87777c9b7-fxzh6 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/packageserver-87777c9b7-fxzh6?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:08:55Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.65/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:09:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:09:32Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:09:32Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:09:35Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.65:5443/healthz\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:09:35Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.65:5443/healthz\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:09:50Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.65:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:09:50Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.65:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:09:50Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.65:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T02:09:50Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.65:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"}]}events/openshift-apiserver.json0000640000000000000000000002066515144476207015457 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:52Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-996fc886d to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:52Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-996fc886d-zb7x5","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:56Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : configmap \"etcd-serving-ca\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:56Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:56Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:56Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:57Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-996fc886d to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:57Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-7b55c578b7-cvwml","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:57Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-996fc886d-zb7x5","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:57Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-7b55c578b7 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : configmap \"etcd-serving-ca\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:06:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:02Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:05Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-7b55c578b7 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:06Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-67f79f9544-nhm26","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:06Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-7b55c578b7-cvwml","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-67f79f9544 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:08Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-578b9bc556 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:08Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:08Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-67f79f9544-nhm26","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:08Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-578b9bc556-8g98v","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:08Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-67f79f9544 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:09Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:20Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\" in 11.13s (11.13s including waiting). Image size: 584205881 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:23.939211Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:32Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:32Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:33Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:33Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:33Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:33Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:34Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[-]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa failed: reason withheld\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T02:07:34Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000011263515144476207017307 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:01:43Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-6d4655d9cf to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:01:53Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-6d4655d9cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:05:14Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-6d4655d9cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:05:16Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-6d4655d9cf-v7lmz","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\" in 1.479s (1.479s including waiting). Image size: 507103881 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"LeaderElection","message":"openshift-apiserver-operator-6d4655d9cf-v7lmz_343870c7-9967-40b5-8fd1-4abfeff25fdb became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:03Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:03Z","reason":"SecretCreateFailed","message":"Failed to create Secret/etcd-client -n openshift-apiserver: secrets \"etcd-client\" already exists","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"ResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"ResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 2, desired generation is 3.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 2, desired generation is 3.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 3, desired generation is 4.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:08Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 3, desired generation is 4.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.32\"}] to [{\"operator\" \"4.18.32\"} {\"openshift-apiserver\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:07:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:08:23Z","reason":"BackOff","message":"Back-off restarting failed container openshift-apiserver-operator in pod openshift-apiserver-operator-6d4655d9cf-v7lmz_openshift-apiserver-operator(e379cfaf-3a4c-40e7-8641-3524b3669295)","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:09:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:09:33Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:09:33Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:09:50Z","reason":"LeaderElection","message":"openshift-apiserver-operator-6d4655d9cf-v7lmz_25b7a61b-e8c3-411b-9415-52fb008a364a became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:09:50Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:09:52Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T02:09:53Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007571315144476207020216 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:01:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-7485d55966 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:01:50Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-7485d55966-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:05:15Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-7485d55966-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:05:17Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-7485d55966-mmhcs","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.24/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" in 861ms (861ms including waiting). Image size: 501222351 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\",Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-7485d55966-mmhcs_21c9e105-30ee-4847-9dcb-ef735fd5cedf became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:43Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:43Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:43Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:55Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:55Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:06:59Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:03Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:07Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:07Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:13Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:13Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:15Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:16Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:17Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:17Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:24Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:25Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:26Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:27Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:07:31Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:09:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:09:33Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-16T02:09:33Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000703315144476207016353 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:02Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:03Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:11Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:21Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:22Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:25Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:25Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:25Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:29Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.54/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:32Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-16T02:07:32Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000015120115144476207022016 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:01:42Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-78ff47c7c5 to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:01:52Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:05:15Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:05:17Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-78ff47c7c5-dgxhp","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:38Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:38Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:50Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" in 441ms (441ms including waiting). Image size: 503717987 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"LeaderElection","message":"kube-controller-manager-operator-78ff47c7c5-dgxhp_e007b16e-456c-4d57-aca1-72edb064ba7b became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-klzk6\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"),Progressing changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:55Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:56Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:56Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:06:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:00Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:00Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:00Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-klzk6\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:01Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:03Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:05Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:07Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:07Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:07Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:07Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:18Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:18Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.17:60380-\u003e172.30.0.10:53: read: connection refused\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.17:60380-\u003e172.30.0.10:53: read: connection refused\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:24Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:25Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:26Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:27Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:27Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:28Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:29Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:32Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:40Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:42Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:42Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:43Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:07:49Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:09:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:09:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\\nBackingResourceControllerDegraded: \\\"manifests/installer-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\\nBackingResourceControllerDegraded: \\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:09:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nBackingResourceControllerDegraded: \\\"manifests/installer-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts installer-sa)\\nBackingResourceControllerDegraded: \\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:09:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/cluster-policy-controller-config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps cluster-policy-controller-config)\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:09:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/cluster-policy-controller-config\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps cluster-policy-controller-config)\" to \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\\\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\\nKubeControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T02:10:01Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000761115144476207020172 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:07:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.55/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:07:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:07:33Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:07:33Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:07:47Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:08:53Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_1f35c7c9-16ec-486e-99ff-f1cbcce76eb3_0(669ed33a69ff47843ed79d4b81518eadb52fd57111481860b0dc8824f552b0f3): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"669ed33a69ff47843ed79d4b81518eadb52fd57111481860b0dc8824f552b0f3\" Netns:\"/var/run/netns/9cbafa4c-a8f9-4d92-ba38-eb144fbc45cc\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=669ed33a69ff47843ed79d4b81518eadb52fd57111481860b0dc8824f552b0f3;K8S_POD_UID=1f35c7c9-16ec-486e-99ff-f1cbcce76eb3\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/1f35c7c9-16ec-486e-99ff-f1cbcce76eb3]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:08:55Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.66/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:09:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:09:33Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T02:09:33Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215144476207016372 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-16T02:07:25Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.50/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-16T02:07:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-16T02:07:25Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-16T02:07:25Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000016421015144476207020227 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:01:57Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-54984b6678 to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:01:58Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-54984b6678-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:05:15Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-54984b6678-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:05:17Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-54984b6678-dsjz2","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:30Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:31Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:31Z","reason":"LeaderElection","message":"kube-apiserver-operator-54984b6678-dsjz2_7069fcfb-e2d4-4cf6-96a6-6bcfa7796c54 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:31Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to False (\"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"),Progressing set to False (\"All is well\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to False (\"All is well\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:33Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:33Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:34Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:34Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:34Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:34Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:34Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:35Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:35Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:35Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:35Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:36Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:36Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:36Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:36Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:36Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:36Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:37Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:37Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:37Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:37Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:37Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:37Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:40Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:40Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:40Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:40Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:40Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:43Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:43Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:43Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:48Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:50Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:03Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:04Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:07Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:12Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:15Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:16Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:17Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:17Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:17Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:20Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:07:24Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:09:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:09:33Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T02:09:33Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615144476207014372 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:07:22Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:07:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:07:22Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:07:22Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:07:53Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:07Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:07Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:20Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:20Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:34Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:34Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:48Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:48Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:48Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:48Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:49Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:49Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:49Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:49Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:49Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:49Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:50Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-16T02:08:50Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000004010615144476207016217 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:01:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-67bf55ccdd to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:01:55Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-67bf55ccdd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:05:14Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-67bf55ccdd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:05:16Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-67bf55ccdd-htjgz","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.12/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\": rpc error: code = Canceled desc = reading blob sha256:c81d64f375332c491d874d6f95c581360e73c884a6c8d1fad90c74e286480cf7: Get \"https://quay.io/v2/openshift-release-dev/ocp-v4.0-art-dev/blobs/sha256:c81d64f375332c491d874d6f95c581360e73c884a6c8d1fad90c74e286480cf7\": context canceled","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:50Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" in 2.476s (2.476s including waiting). Image size: 513211213 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"LeaderElection","message":"etcd-operator-67bf55ccdd-htjgz_75ecc8a9-9a7b-4e9c-8e64-75a6c67898a2 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:55Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:55Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:56Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:59Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:59Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:06:59Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:00Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:00Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:01Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:02Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:05Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:09Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:07:15Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:09:29Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:09:29Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T02:09:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000637615144476207016600 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:06Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-747969bcdd-dth9n","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-747969bcdd to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.41/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:11Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" in 4.048s (4.048s including waiting). Image size: 500175306 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:12Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:12Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-747969bcdd-dth9n","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:12Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6796f86fd6-qtxkl","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:12Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-747969bcdd to 0 from 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:12Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6796f86fd6 to 1 from 0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:13Z","reason":"Killing","message":"Stopping container oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T02:07:23.939819Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"}]}events/openshift-ingress.json0000640000000000000000000000056015144476207015121 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T02:07:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-864ddd5f56 to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T02:07:07Z","reason":"SuccessfulCreate","message":"Created pod: router-default-864ddd5f56-ffptx","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000020515215144476207020323 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:01:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-755d954778 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:01:55Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:05:14Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:05:16Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-755d954778-bngv9","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:29Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:37Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:39Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" in 1.779s (1.779s including waiting). Image size: 508050651 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:40Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:40Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:41Z","reason":"LeaderElection","message":"authentication-operator-755d954778-bngv9_ca31ac83-3d69-4328-ac27-4764cb6e9b16 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to False (\"All is well\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\",Available changed from Unknown to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:46Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-r92mx\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-r92mx\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:51Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:57Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:06:58Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:00Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:02Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:06Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.66.165:443/healthz\\\": dial tcp 172.30.66.165:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:17Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T02:07:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015144476207016302 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-16T02:07:07Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-16T02:07:07Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003464115144476204014617 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":336,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015144476204014102 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215144476171020206 0ustar0000000000000000[]events/openshift-machine-api.json0000640000000000000000000000037515144476167015633 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T02:07:48Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : secret \"machine-api-operator-tls\" not found","type":"Warning"}]}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715144476165017550 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-16T02:07:03Z","not_after":"2028-02-16T02:07:04Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-16T02:07:06Z","not_after":"2028-02-16T02:07:07Z","controllers":[]}]aggregated/unused_machine_configs_count.json0000640000000000000000000000004115144476165020144 0ustar0000000000000000{"unused_machineconfigs_count":9}config/featuregate.json0000640000000000000000000000613615144476160013712 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"9ee58658-c54d-44d1-829c-7ad2cffa3434","resourceVersion":"649","generation":1,"creationTimestamp":"2026-02-16T02:01:07Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.32","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/node/logs/master-0.log0000640000000000000000000014231615144476157014556 0ustar0000000000000000Feb 16 02:08:53.856851 master-0 kubenswrapper[7721]: E0216 02:08:53.856772 7721 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"installer-2-master-0_openshift-kube-controller-manager(1f35c7c9-16ec-486e-99ff-f1cbcce76eb3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"installer-2-master-0_openshift-kube-controller-manager(1f35c7c9-16ec-486e-99ff-f1cbcce76eb3)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_1f35c7c9-16ec-486e-99ff-f1cbcce76eb3_0(669ed33a69ff47843ed79d4b81518eadb52fd57111481860b0dc8824f552b0f3): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"669ed33a69ff47843ed79d4b81518eadb52fd57111481860b0dc8824f552b0f3\\\" Netns:\\\"/var/run/netns/9cbafa4c-a8f9-4d92-ba38-eb144fbc45cc\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=669ed33a69ff47843ed79d4b81518eadb52fd57111481860b0dc8824f552b0f3;K8S_POD_UID=1f35c7c9-16ec-486e-99ff-f1cbcce76eb3\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/1f35c7c9-16ec-486e-99ff-f1cbcce76eb3]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-kube-controller-manager/installer-2-master-0" podUID="1f35c7c9-16ec-486e-99ff-f1cbcce76eb3" Feb 16 02:08:53.865154 master-0 kubenswrapper[7721]: E0216 02:08:53.865070 7721 log.go:32] "RunPodSandbox from runtime service failed" err=< Feb 16 02:08:53.865479 master-0 kubenswrapper[7721]: E0216 02:08:53.865164 7721 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Feb 16 02:08:53.865479 master-0 kubenswrapper[7721]: E0216 02:08:53.865194 7721 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Feb 16 02:08:53.865479 master-0 kubenswrapper[7721]: E0216 02:08:53.865277 7721 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"cluster-baremetal-operator-7bc947fc7d-frvgm_openshift-machine-api(27a42eb0-677c-414d-b0ec-f945ec39b7e9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"cluster-baremetal-operator-7bc947fc7d-frvgm_openshift-machine-api(27a42eb0-677c-414d-b0ec-f945ec39b7e9)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-baremetal-operator-7bc947fc7d-frvgm_openshift-machine-api_27a42eb0-677c-414d-b0ec-f945ec39b7e9_0(cadc5441e05b9fa1450de35e6ae49b1211df76390ff17cc1846481dc8196699d): error adding pod openshift-machine-api_cluster-baremetal-operator-7bc947fc7d-frvgm to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"cadc5441e05b9fa1450de35e6ae49b1211df76390ff17cc1846481dc8196699d\\\" Netns:\\\"/var/run/netns/6f24556d-5c25-4835-9b5f-79b0e2987443\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=cluster-baremetal-operator-7bc947fc7d-frvgm;K8S_POD_INFRA_CONTAINER_ID=cadc5441e05b9fa1450de35e6ae49b1211df76390ff17cc1846481dc8196699d;K8S_POD_UID=27a42eb0-677c-414d-b0ec-f945ec39b7e9\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-machine-api/cluster-baremetal-operator-7bc947fc7d-frvgm] networking: Multus: [openshift-machine-api/cluster-baremetal-operator-7bc947fc7d-frvgm/27a42eb0-677c-414d-b0ec-f945ec39b7e9]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-baremetal-operator-7bc947fc7d-frvgm in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-baremetal-operator-7bc947fc7d-frvgm in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/cluster-baremetal-operator-7bc947fc7d-frvgm?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-machine-api/cluster-baremetal-operator-7bc947fc7d-frvgm" podUID="27a42eb0-677c-414d-b0ec-f945ec39b7e9" Feb 16 02:08:53.871339 master-0 kubenswrapper[7721]: E0216 02:08:53.871264 7721 log.go:32] "RunPodSandbox from runtime service failed" err=< Feb 16 02:08:53.871635 master-0 kubenswrapper[7721]: E0216 02:08:53.871355 7721 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Feb 16 02:08:53.871635 master-0 kubenswrapper[7721]: E0216 02:08:53.871381 7721 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Feb 16 02:08:53.871635 master-0 kubenswrapper[7721]: E0216 02:08:53.871484 7721 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"cluster-storage-operator-75b869db96-qm7rm_openshift-cluster-storage-operator(a77e2f8f-d164-4a58-aab2-f3444c05cacb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"cluster-storage-operator-75b869db96-qm7rm_openshift-cluster-storage-operator(a77e2f8f-d164-4a58-aab2-f3444c05cacb)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-storage-operator-75b869db96-qm7rm_openshift-cluster-storage-operator_a77e2f8f-d164-4a58-aab2-f3444c05cacb_0(1dee064bb5bd1b7527527c7c8f3d5597940850a81a81c2dc80a67ec89f33bc4a): error adding pod openshift-cluster-storage-operator_cluster-storage-operator-75b869db96-qm7rm to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"1dee064bb5bd1b7527527c7c8f3d5597940850a81a81c2dc80a67ec89f33bc4a\\\" Netns:\\\"/var/run/netns/2361ae1d-1ba2-47f0-be7c-1dacead0f37f\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-cluster-storage-operator;K8S_POD_NAME=cluster-storage-operator-75b869db96-qm7rm;K8S_POD_INFRA_CONTAINER_ID=1dee064bb5bd1b7527527c7c8f3d5597940850a81a81c2dc80a67ec89f33bc4a;K8S_POD_UID=a77e2f8f-d164-4a58-aab2-f3444c05cacb\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-cluster-storage-operator/cluster-storage-operator-75b869db96-qm7rm] networking: Multus: [openshift-cluster-storage-operator/cluster-storage-operator-75b869db96-qm7rm/a77e2f8f-d164-4a58-aab2-f3444c05cacb]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-storage-operator-75b869db96-qm7rm in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-storage-operator-75b869db96-qm7rm in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-cluster-storage-operator/pods/cluster-storage-operator-75b869db96-qm7rm?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96-qm7rm" podUID="a77e2f8f-d164-4a58-aab2-f3444c05cacb" Feb 16 02:08:54.055126 master-0 kubenswrapper[7721]: E0216 02:08:54.053918 7721 log.go:32] "RunPodSandbox from runtime service failed" err=< Feb 16 02:08:54.055126 master-0 kubenswrapper[7721]: E0216 02:08:54.053994 7721 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Feb 16 02:08:54.055126 master-0 kubenswrapper[7721]: E0216 02:08:54.054029 7721 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Feb 16 02:08:54.055126 master-0 kubenswrapper[7721]: E0216 02:08:54.054103 7721 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"machine-config-operator-84976bb859-5gs6g_openshift-machine-config-operator(d870332c-2498-4135-a9b3-a71e67c2805b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"machine-config-operator-84976bb859-5gs6g_openshift-machine-config-operator(d870332c-2498-4135-a9b3-a71e67c2805b)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_machine-config-operator-84976bb859-5gs6g_openshift-machine-config-operator_d870332c-2498-4135-a9b3-a71e67c2805b_0(a72b5c78c9fcfa97e9e7b48a7b7d132cc90d036ec7cf584720d35a155b84d862): error adding pod openshift-machine-config-operator_machine-config-operator-84976bb859-5gs6g to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"a72b5c78c9fcfa97e9e7b48a7b7d132cc90d036ec7cf584720d35a155b84d862\\\" Netns:\\\"/var/run/netns/30447401-ef28-47e7-9e80-d54dcdd258b4\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-config-operator;K8S_POD_NAME=machine-config-operator-84976bb859-5gs6g;K8S_POD_INFRA_CONTAINER_ID=a72b5c78c9fcfa97e9e7b48a7b7d132cc90d036ec7cf584720d35a155b84d862;K8S_POD_UID=d870332c-2498-4135-a9b3-a71e67c2805b\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-machine-config-operator/machine-config-operator-84976bb859-5gs6g] networking: Multus: [openshift-machine-config-operator/machine-config-operator-84976bb859-5gs6g/d870332c-2498-4135-a9b3-a71e67c2805b]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod machine-config-operator-84976bb859-5gs6g in out of cluster comm: SetNetworkStatus: failed to update the pod machine-config-operator-84976bb859-5gs6g in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-config-operator/pods/machine-config-operator-84976bb859-5gs6g?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-machine-config-operator/machine-config-operator-84976bb859-5gs6g" podUID="d870332c-2498-4135-a9b3-a71e67c2805b" Feb 16 02:08:54.066869 master-0 kubenswrapper[7721]: E0216 02:08:54.066782 7721 log.go:32] "RunPodSandbox from runtime service failed" err=< Feb 16 02:08:54.067158 master-0 kubenswrapper[7721]: E0216 02:08:54.066886 7721 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Feb 16 02:08:54.067158 master-0 kubenswrapper[7721]: E0216 02:08:54.066916 7721 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Feb 16 02:08:54.067158 master-0 kubenswrapper[7721]: E0216 02:08:54.067020 7721 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"packageserver-87777c9b7-fxzh6_openshift-operator-lifecycle-manager(dc3354cb-b6c3-40a5-a695-cccb079ad292)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"packageserver-87777c9b7-fxzh6_openshift-operator-lifecycle-manager(dc3354cb-b6c3-40a5-a695-cccb079ad292)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_packageserver-87777c9b7-fxzh6_openshift-operator-lifecycle-manager_dc3354cb-b6c3-40a5-a695-cccb079ad292_0(da95de67fb0edb5fb8df64ae73b9f1edf43efdd11e844bf8acfb0e130cf27042): error adding pod openshift-operator-lifecycle-manager_packageserver-87777c9b7-fxzh6 to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"da95de67fb0edb5fb8df64ae73b9f1edf43efdd11e844bf8acfb0e130cf27042\\\" Netns:\\\"/var/run/netns/815f194d-aa81-40db-8fad-e5e827139425\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=packageserver-87777c9b7-fxzh6;K8S_POD_INFRA_CONTAINER_ID=da95de67fb0edb5fb8df64ae73b9f1edf43efdd11e844bf8acfb0e130cf27042;K8S_POD_UID=dc3354cb-b6c3-40a5-a695-cccb079ad292\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/packageserver-87777c9b7-fxzh6] networking: Multus: [openshift-operator-lifecycle-manager/packageserver-87777c9b7-fxzh6/dc3354cb-b6c3-40a5-a695-cccb079ad292]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod packageserver-87777c9b7-fxzh6 in out of cluster comm: SetNetworkStatus: failed to update the pod packageserver-87777c9b7-fxzh6 in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/packageserver-87777c9b7-fxzh6?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-operator-lifecycle-manager/packageserver-87777c9b7-fxzh6" podUID="dc3354cb-b6c3-40a5-a695-cccb079ad292" Feb 16 02:08:54.235366 master-0 kubenswrapper[7721]: E0216 02:08:54.235145 7721 log.go:32] "RunPodSandbox from runtime service failed" err=< Feb 16 02:08:54.235615 master-0 kubenswrapper[7721]: E0216 02:08:54.235490 7721 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Feb 16 02:08:54.235615 master-0 kubenswrapper[7721]: E0216 02:08:54.235575 7721 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Feb 16 02:08:54.235898 master-0 kubenswrapper[7721]: E0216 02:08:54.235701 7721 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"machine-api-operator-bd7dd5c46-qw2zq_openshift-machine-api(fec84b8a-a0d1-4b07-8827-cef0beb89ecd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"machine-api-operator-bd7dd5c46-qw2zq_openshift-machine-api(fec84b8a-a0d1-4b07-8827-cef0beb89ecd)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_machine-api-operator-bd7dd5c46-qw2zq_openshift-machine-api_fec84b8a-a0d1-4b07-8827-cef0beb89ecd_0(ddf392bda525c14a44feb60e45a91b90aee0178b6c82e7ca55201afcbe8c9a82): error adding pod openshift-machine-api_machine-api-operator-bd7dd5c46-qw2zq to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"ddf392bda525c14a44feb60e45a91b90aee0178b6c82e7ca55201afcbe8c9a82\\\" Netns:\\\"/var/run/netns/df6e20e2-ea38-4975-aa7c-a486d9ab5d3c\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=machine-api-operator-bd7dd5c46-qw2zq;K8S_POD_INFRA_CONTAINER_ID=ddf392bda525c14a44feb60e45a91b90aee0178b6c82e7ca55201afcbe8c9a82;K8S_POD_UID=fec84b8a-a0d1-4b07-8827-cef0beb89ecd\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-machine-api/machine-api-operator-bd7dd5c46-qw2zq] networking: Multus: [openshift-machine-api/machine-api-operator-bd7dd5c46-qw2zq/fec84b8a-a0d1-4b07-8827-cef0beb89ecd]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod machine-api-operator-bd7dd5c46-qw2zq in out of cluster comm: SetNetworkStatus: failed to update the pod machine-api-operator-bd7dd5c46-qw2zq in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/machine-api-operator-bd7dd5c46-qw2zq?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-machine-api/machine-api-operator-bd7dd5c46-qw2zq" podUID="fec84b8a-a0d1-4b07-8827-cef0beb89ecd" Feb 16 02:08:54.238631 master-0 kubenswrapper[7721]: E0216 02:08:54.238573 7721 log.go:32] "RunPodSandbox from runtime service failed" err=< Feb 16 02:08:54.238804 master-0 kubenswrapper[7721]: E0216 02:08:54.238651 7721 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Feb 16 02:08:54.238804 master-0 kubenswrapper[7721]: E0216 02:08:54.238686 7721 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Feb 16 02:08:54.239172 master-0 kubenswrapper[7721]: E0216 02:08:54.239034 7721 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"insights-operator-cb4f7b4cf-llpf5_openshift-insights(0abea413-e08a-465a-8ec4-2be650bfd5bd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"insights-operator-cb4f7b4cf-llpf5_openshift-insights(0abea413-e08a-465a-8ec4-2be650bfd5bd)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_insights-operator-cb4f7b4cf-llpf5_openshift-insights_0abea413-e08a-465a-8ec4-2be650bfd5bd_0(bb1a535dee1282a97a3ffd2d02571d7824aeccc3e07cae01b324766d38cf3e41): error adding pod openshift-insights_insights-operator-cb4f7b4cf-llpf5 to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"bb1a535dee1282a97a3ffd2d02571d7824aeccc3e07cae01b324766d38cf3e41\\\" Netns:\\\"/var/run/netns/ab93e9ad-cb28-49f4-9adc-b0719026e287\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-insights;K8S_POD_NAME=insights-operator-cb4f7b4cf-llpf5;K8S_POD_INFRA_CONTAINER_ID=bb1a535dee1282a97a3ffd2d02571d7824aeccc3e07cae01b324766d38cf3e41;K8S_POD_UID=0abea413-e08a-465a-8ec4-2be650bfd5bd\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-insights/insights-operator-cb4f7b4cf-llpf5] networking: Multus: [openshift-insights/insights-operator-cb4f7b4cf-llpf5/0abea413-e08a-465a-8ec4-2be650bfd5bd]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod insights-operator-cb4f7b4cf-llpf5 in out of cluster comm: SetNetworkStatus: failed to update the pod insights-operator-cb4f7b4cf-llpf5 in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-insights/pods/insights-operator-cb4f7b4cf-llpf5?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-insights/insights-operator-cb4f7b4cf-llpf5" podUID="0abea413-e08a-465a-8ec4-2be650bfd5bd" Feb 16 02:08:54.256983 master-0 kubenswrapper[7721]: E0216 02:08:54.256916 7721 log.go:32] "RunPodSandbox from runtime service failed" err=< Feb 16 02:08:54.257160 master-0 kubenswrapper[7721]: E0216 02:08:54.257036 7721 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err=< Feb 16 02:08:54.257160 master-0 kubenswrapper[7721]: E0216 02:08:54.257081 7721 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err=< Feb 16 02:08:54.257449 master-0 kubenswrapper[7721]: E0216 02:08:54.257231 7721 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"cluster-autoscaler-operator-67fd9768b5-9rvcj_openshift-machine-api(48863ff6-63ac-42d7-bac7-29d888c92db9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"cluster-autoscaler-operator-67fd9768b5-9rvcj_openshift-machine-api(48863ff6-63ac-42d7-bac7-29d888c92db9)\\\": rpc error: code = Unknown desc = failed to create pod network sandbox k8s_cluster-autoscaler-operator-67fd9768b5-9rvcj_openshift-machine-api_48863ff6-63ac-42d7-bac7-29d888c92db9_0(78c1aee49bc52fc905641630bdd5583d28d1d97478719e45721e361b9267d074): error adding pod openshift-machine-api_cluster-autoscaler-operator-67fd9768b5-9rvcj to CNI network \\\"multus-cni-network\\\": plugin type=\\\"multus-shim\\\" name=\\\"multus-cni-network\\\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\\\"78c1aee49bc52fc905641630bdd5583d28d1d97478719e45721e361b9267d074\\\" Netns:\\\"/var/run/netns/c28cf4bd-3a2a-42ba-9605-e2eca9af488c\\\" IfName:\\\"eth0\\\" Args:\\\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=cluster-autoscaler-operator-67fd9768b5-9rvcj;K8S_POD_INFRA_CONTAINER_ID=78c1aee49bc52fc905641630bdd5583d28d1d97478719e45721e361b9267d074;K8S_POD_UID=48863ff6-63ac-42d7-bac7-29d888c92db9\\\" Path:\\\"\\\" ERRORED: error configuring pod [openshift-machine-api/cluster-autoscaler-operator-67fd9768b5-9rvcj] networking: Multus: [openshift-machine-api/cluster-autoscaler-operator-67fd9768b5-9rvcj/48863ff6-63ac-42d7-bac7-29d888c92db9]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod cluster-autoscaler-operator-67fd9768b5-9rvcj in out of cluster comm: SetNetworkStatus: failed to update the pod cluster-autoscaler-operator-67fd9768b5-9rvcj in out of cluster comm: status update failed for pod /: Get \\\"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/cluster-autoscaler-operator-67fd9768b5-9rvcj?timeout=1m0s\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\n': StdinData: {\\\"binDir\\\":\\\"/var/lib/cni/bin\\\",\\\"clusterNetwork\\\":\\\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\\\",\\\"cniVersion\\\":\\\"0.3.1\\\",\\\"daemonSocketDir\\\":\\\"/run/multus/socket\\\",\\\"globalNamespaces\\\":\\\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\\\",\\\"logLevel\\\":\\\"verbose\\\",\\\"logToStderr\\\":true,\\\"name\\\":\\\"multus-cni-network\\\",\\\"namespaceIsolation\\\":true,\\\"type\\\":\\\"multus-shim\\\"}\"" pod="openshift-machine-api/cluster-autoscaler-operator-67fd9768b5-9rvcj" podUID="48863ff6-63ac-42d7-bac7-29d888c92db9" Feb 16 02:08:58.205194 master-0 kubenswrapper[7721]: E0216 02:08:58.205023 7721 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Feb 16 02:08:58.740729 master-0 kubenswrapper[7721]: E0216 02:08:58.740618 7721 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Feb 16 02:08:58.741045 master-0 kubenswrapper[7721]: E0216 02:08:58.740944 7721 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.017s" Feb 16 02:09:01.283567 master-0 kubenswrapper[7721]: E0216 02:09:01.283309 7721 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{cluster-samples-operator-f8cbff74c-k8jz5.189497fea9ea2474 openshift-cluster-samples-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-cluster-samples-operator,Name:cluster-samples-operator-f8cbff74c-k8jz5,UID:5b62004d-7fe3-47ae-8e26-8496befb047c,APIVersion:v1,ResourceVersion:8804,FieldPath:spec.containers{cluster-samples-operator},},Reason:Pulling,Message:Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9\",Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-02-16 02:07:53.491629172 +0000 UTC m=+76.985863434,LastTimestamp:2026-02-16 02:07:53.491629172 +0000 UTC m=+76.985863434,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Feb 16 02:09:02.344552 master-0 kubenswrapper[7721]: E0216 02:09:02.344427 7721 fsHandler.go:119] failed to collect filesystem stats - rootDiskErr: could not stat "/var/lib/containers/storage/overlay/8faeb53b68a176c805372cd5599e2828bcc41d833304a4005952056810219343/diff" to get inode usage: stat /var/lib/containers/storage/overlay/8faeb53b68a176c805372cd5599e2828bcc41d833304a4005952056810219343/diff: no such file or directory, extraDiskErr: Feb 16 02:09:08.406636 master-0 kubenswrapper[7721]: E0216 02:09:08.406543 7721 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="400ms" Feb 16 02:09:08.920193 master-0 kubenswrapper[7721]: E0216 02:09:08.919871 7721 kubelet_node_status.go:585] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2026-02-16T02:08:58Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-02-16T02:08:58Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-02-16T02:08:58Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-02-16T02:08:58Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"registry.redhat.io/redhat/redhat-operator-index@sha256:3e2f869b1c4f98a628b2e54c1516a0d0c09c760c91e0e1a940cb76149217661b\\\",\\\"registry.redhat.io/redhat/redhat-operator-index@sha256:97930d07a108f20287bd5ceb046a5ab125604b2e3564077db9f7d7c077cc5852\\\",\\\"registry.redhat.io/redhat/redhat-operator-index:v4.18\\\"],\\\"sizeBytes\\\":1701129928},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec\\\"],\\\"sizeBytes\\\":1631983282},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181\\\"],\\\"sizeBytes\\\":1232696860},{\\\"names\\\":[\\\"registry.redhat.io/redhat/certified-operator-index@sha256:1e9c22ee3a299d04b38dd66f73f7c33a2a8a1917885eebea853656e5476d3b7f\\\",\\\"registry.redhat.io/redhat/certified-operator-index@sha256:c1f4e2201c8669fcabb7f8eeb19d9f1fcfb999619a0c1f564460705534e1e625\\\",\\\"registry.redhat.io/redhat/certified-operator-index:v4.18\\\"],\\\"sizeBytes\\\":1230725325},{\\\"names\\\":[\\\"registry.redhat.io/redhat/community-operator-index@sha256:382900636cc6bc44aef54886ff17e1948ee0729f04aa833c8319c40657b4fce7\\\",\\\"registry.redhat.io/redhat/community-operator-index@sha256:a577a7b619533a5a450bcc025f40b4792b88c27fdbd8f48fd62b9ffd57d3c5f2\\\",\\\"registry.redhat.io/redhat/community-operator-index:v4.18\\\"],\\\"sizeBytes\\\":1212986054},{\\\"names\\\":[\\\"registry.redhat.io/redhat/redhat-marketplace-index@sha256:28df36269fc553eb1adba5566d6dfc258a1a74063c4cfe8b5bdd3f202591cf56\\\",\\\"registry.redhat.io/redhat/redhat-marketplace-index@sha256:7fa59a55753e6c646b3b56a1a7080a5d70767fb964f1857c411fdf4e05ad4c71\\\",\\\"registry.redhat.io/redhat/redhat-marketplace-index:v4.18\\\"],\\\"sizeBytes\\\":1201887930},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\\\"],\\\"sizeBytes\\\":987280724},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d\\\"],\\\"sizeBytes\\\":938665460},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc\\\"],\\\"sizeBytes\\\":913084961},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072\\\"],\\\"sizeBytes\\\":870929735},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\\\"],\\\"sizeBytes\\\":857432360},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd\\\"],\\\"sizeBytes\\\":767663184},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e30865ea7d55b76cb925c7d26c650f0bc70fd9a02d7d59d0fe1a3024426229ad\\\"],\\\"sizeBytes\\\":682673937},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7\\\"],\\\"sizeBytes\\\":677894171},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55\\\"],\\\"sizeBytes\\\":672642165},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e\\\"],\\\"sizeBytes\\\":616473928},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\\\"],\\\"sizeBytes\\\":584205881},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954\\\"],\\\"sizeBytes\\\":576983707},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee\\\"],\\\"sizeBytes\\\":553036394},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471\\\"],\\\"sizeBytes\\\":552251951},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861\\\"],\\\"sizeBytes\\\":543577525},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3\\\"],\\\"sizeBytes\\\":524042902},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d\\\"],\\\"sizeBytes\\\":523760203},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\\\"],\\\"sizeBytes\\\":513211213},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\\\"],\\\"sizeBytes\\\":512819769},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\\\"],\\\"sizeBytes\\\":509806416},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\\\"],\\\"sizeBytes\\\":508050651},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\\\"],\\\"sizeBytes\\\":507103881},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3\\\"],\\\"sizeBytes\\\":506056636},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1\\\"],\\\"sizeBytes\\\":505990615},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\\\"],\\\"sizeBytes\\\":503717987},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e\\\"],\\\"sizeBytes\\\":503374574},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88\\\"],\\\"sizeBytes\\\":502798848},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1\\\"],\\\"sizeBytes\\\":501305896},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a\\\"],\\\"sizeBytes\\\":501222351},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\\\"],\\\"sizeBytes\\\":500175306},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b\\\"],\\\"sizeBytes\\\":500068323},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144\\\"],\\\"sizeBytes\\\":499445182},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b\\\"],\\\"sizeBytes\\\":490819380},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b\\\"],\\\"sizeBytes\\\":489891070},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38\\\"],\\\"sizeBytes\\\":481921522},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041\\\"],\\\"sizeBytes\\\":479280723},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b\\\"],\\\"sizeBytes\\\":479006001},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb\\\"],\\\"sizeBytes\\\":465507019},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09\\\"],\\\"sizeBytes\\\":463090242},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d\\\"],\\\"sizeBytes\\\":462065055},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\\\"],\\\"sizeBytes\\\":459915626},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c\\\"],\\\"sizeBytes\\\":458531660},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a\\\"],\\\"sizeBytes\\\":452956763},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956\\\"],\\\"sizeBytes\\\":451401927}],\\\"runtimeHandlers\\\":[{\\\"features\\\":{\\\"recursiveReadOnlyMounts\\\":true,\\\"userNamespaces\\\":true},\\\"name\\\":\\\"runc\\\"},{\\\"features\\\":{\\\"recursiveReadOnlyMounts\\\":true,\\\"userNamespaces\\\":true},\\\"name\\\":\\\"crun\\\"},{\\\"features\\\":{\\\"recursiveReadOnlyMounts\\\":true,\\\"userNamespaces\\\":true},\\\"name\\\":\\\"\\\"}]}}\" for node \"master-0\": Patch \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 16 02:09:13.441928 master-0 kubenswrapper[7721]: E0216 02:09:13.441793 7721 cadvisor_stats_provider.go:516] "Partial failure issuing cadvisor.ContainerInfoV2" err="partial failures: [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podf2a7e185_78f4_4d69_b126_d465374a6218.slice/crio-4fc83c72923d06bb27dc72e1294113ac5b34e6ed149d10d4a4b519d50c5b89a9\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podf2a7e185_78f4_4d69_b126_d465374a6218.slice\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7eda8a42_765e_47cf_896f_324e8185062e.slice/crio-71f88debd6e32c8926a0394683094104a5453ca71a39b14a81064d10cb0255f9\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-pod0615fd34_eaf9_4a3a_8543_25a7a5747194.slice\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podc9cd32bc_a13a_44ee_ba52_7bb335c7007b.slice/crio-3c59868e46c60a0139fbb9feace033d7ff3288c7e5f3febf6586656bff57983b.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod9460ca0802075a8a6a10d7b3e6052c4d.slice/crio-0d84c00dcc11900a2f5a4ff15f798ef8c8b6cc92a9b7e1f32a7c33bfeed4a478.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod980aa005_f51d_4ca2_aee6_a6fdeefd86d0.slice/crio-ff658673f7455373622a5b5ee3d4af2de4dca2c4bf35a4e09ed477558c99902a.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod4a5b01c1_1231_4e69_8b6c_c4981b65b26e.slice/crio-conmon-5fc216122a0910fe569f2678eb8d9427d5895c0ca4368e57e2f60b2f9f7164e2.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod9460ca0802075a8a6a10d7b3e6052c4d.slice/crio-conmon-0d84c00dcc11900a2f5a4ff15f798ef8c8b6cc92a9b7e1f32a7c33bfeed4a478.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod4a5b01c1_1231_4e69_8b6c_c4981b65b26e.slice/crio-5fc216122a0910fe569f2678eb8d9427d5895c0ca4368e57e2f60b2f9f7164e2.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod980aa005_f51d_4ca2_aee6_a6fdeefd86d0.slice/crio-conmon-ff658673f7455373622a5b5ee3d4af2de4dca2c4bf35a4e09ed477558c99902a.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-pod80f43f07_ce08_4c21_9463_ea983a110244.slice/crio-b4ee28c7394858e0cf4928c25f023b84c89ee6af3676ca6c853d7b858571c63f.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-pod4733c2df_0f5a_4696_b8c6_2568ebc7debc.slice\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod91938be6_9ae4_4849_abe8_fc842daecd23.slice/crio-conmon-3af1f9b9834764b079edacabd51db4c771ce412df5b31f88b96200c070e64727.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod6c02961f_30ec_4405_b7fa_9c4192342ae9.slice/crio-4af3b63baf882cf9b9d02a791b48a2c854ad5ccd1fbd43903fb2e66b8e587e95.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-pod8ea4c28c_8f53_4b41_9c85_c8c50599d7cd.slice/crio-conmon-bb9ffb6ca918ba3341c8df0e7c8c8ba7325d86a68eb6b2856270c9f7326551b5.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-pod4733c2df_0f5a_4696_b8c6_2568ebc7debc.slice/crio-3537f96b40e8859a6a366ec6550aaba73f34d9f862f4f2e89eccfbc047d01b00.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-pod80f43f07_ce08_4c21_9463_ea983a110244.slice/crio-conmon-b4ee28c7394858e0cf4928c25f023b84c89ee6af3676ca6c853d7b858571c63f.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod1743372f_bdb0_4558_b47b_3714f3aa3fde.slice/crio-conmon-1f742ab76573db69bc143df83fcf581f4c09f3de9ec005f01809b1af5690b4d3.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7eda8a42_765e_47cf_896f_324e8185062e.slice\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod1743372f_bdb0_4558_b47b_3714f3aa3fde.slice/crio-1f742ab76573db69bc143df83fcf581f4c09f3de9ec005f01809b1af5690b4d3.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod400a178a4d5e9a88ba5bbbd1da2ad15e.slice/crio-a24c34b6599e046cb5b217ee112cd5793502433694aca39a7811b07f3f980447\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-pod80f43f07_ce08_4c21_9463_ea983a110244.slice/crio-aae309ad89c83d46c9fddf6708eda09d37f1fa06aa9277a0a246c53f3525897c\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-pod4733c2df_0f5a_4696_b8c6_2568ebc7debc.slice/crio-conmon-3537f96b40e8859a6a366ec6550aaba73f34d9f862f4f2e89eccfbc047d01b00.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod400a178a4d5e9a88ba5bbbd1da2ad15e.slice/crio-conmon-d3c90f1e73202b8ff7d7463b840dabc14c0987d4a5dea05816767a582d4b8f44.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-poddbc5b101_936f_4bf3_bbf3_f30966b0ab50.slice/crio-conmon-73c5d4096ed4f5f723bea74695c09c9920b7cf6836ef92fa2286119a88696c78.scope\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod400a178a4d5e9a88ba5bbbd1da2ad15e.slice/crio-1ac49b435dd0ca350c530f89dad4bc64dffda1e4e142d28d15199074e3eba071.scope\": RecentStats: unable to find data in memory cache]" Feb 16 02:09:18.808938 master-0 kubenswrapper[7721]: E0216 02:09:18.808790 7721 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="800ms" Feb 16 02:09:18.921562 master-0 kubenswrapper[7721]: E0216 02:09:18.921414 7721 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 16 02:09:28.922640 master-0 kubenswrapper[7721]: E0216 02:09:28.922531 7721 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 16 02:09:29.541504 master-0 kubenswrapper[7721]: I0216 02:09:29.541390 7721 patch_prober.go:28] interesting pod/etcd-operator-67bf55ccdd-htjgz container/etcd-operator namespace/openshift-etcd-operator: Liveness probe status=failure output="Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused" start-of-body= Feb 16 02:09:29.541802 master-0 kubenswrapper[7721]: I0216 02:09:29.541524 7721 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-etcd-operator/etcd-operator-67bf55ccdd-htjgz" podUID="724ac845-3835-458b-9645-e665be135ff9" containerName="etcd-operator" probeResult="failure" output="Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused" Feb 16 02:09:29.697325 master-0 kubenswrapper[7721]: E0216 02:09:29.697238 7721 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Feb 16 02:09:32.528867 master-0 kubenswrapper[7721]: E0216 02:09:32.522687 7721 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="33.782s" Feb 16 02:09:33.121734 master-0 kubenswrapper[7721]: E0216 02:09:33.120182 7721 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"83c4f2970f98a6eeab62cbdfc7dd76ac41aa01e82c1c4f0bce75a351953e7d24\": container with ID starting with 83c4f2970f98a6eeab62cbdfc7dd76ac41aa01e82c1c4f0bce75a351953e7d24 not found: ID does not exist" containerID="83c4f2970f98a6eeab62cbdfc7dd76ac41aa01e82c1c4f0bce75a351953e7d24" Feb 16 02:09:33.142664 master-0 kubenswrapper[7721]: E0216 02:09:33.130892 7721 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"16aa4cd5e26bb981ce33f09412128895c5e974af71a06a250577d00d2a158d8c\": container with ID starting with 16aa4cd5e26bb981ce33f09412128895c5e974af71a06a250577d00d2a158d8c not found: ID does not exist" containerID="16aa4cd5e26bb981ce33f09412128895c5e974af71a06a250577d00d2a158d8c" Feb 16 02:09:35.287402 master-0 kubenswrapper[7721]: E0216 02:09:35.287254 7721 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{community-operators-trqk8.189497fed508d26e openshift-marketplace 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-marketplace,Name:community-operators-trqk8,UID:ab463f74-d1e7-44f1-9634-d9f63685b06d,APIVersion:v1,ResourceVersion:7445,FieldPath:spec.containers{registry-server},},Reason:Pulling,Message:Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc\",Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-02-16 02:07:54.215060078 +0000 UTC m=+77.709294340,LastTimestamp:2026-02-16 02:07:54.215060078 +0000 UTC m=+77.709294340,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Feb 16 02:09:38.923015 master-0 kubenswrapper[7721]: E0216 02:09:38.922882 7721 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" Feb 16 02:09:41.299023 master-0 kubenswrapper[7721]: E0216 02:09:41.298919 7721 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="3.2s" Feb 16 02:09:45.585348 master-0 kubenswrapper[7721]: E0216 02:09:45.585227 7721 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0"config/running_containers.json0000640000000000000000000001064315144476157015327 0ustar0000000000000000{"images":{"0":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","1":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","10":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","11":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","12":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","13":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","14":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","15":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","16":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","17":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","18":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","19":"registry.redhat.io/redhat/redhat-operator-index:v4.18","2":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","20":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","21":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","22":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","23":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","24":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","25":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","26":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","27":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","28":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","29":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","3":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","30":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","31":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","32":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","33":"sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","34":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","35":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","36":"sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","37":"registry.redhat.io/redhat/certified-operator-index:v4.18","38":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","39":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","4":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","40":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","41":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","42":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","43":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","44":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","45":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","46":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","47":"sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","48":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","49":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","5":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","50":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","51":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","52":"registry.redhat.io/redhat/community-operator-index:v4.18","6":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","7":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","8":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","9":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95"},"containers":{"2026-02":{"0":15,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":1,"17":1,"18":1,"19":1,"2":8,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":4,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":3,"50":1,"51":1,"52":1,"6":2,"7":2,"8":2,"9":2}}}operator-controller-controller-manager-85c9b89969-g9lcm.json0000640000000000000000000002521615144476157032237 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-85c9b89969-g9lcm","generateName":"operator-controller-controller-manager-85c9b89969-","namespace":"openshift-operator-controller","uid":"27d876a7-6a48-4942-ad96-ed8ed3aa104b","resourceVersion":"9325","creationTimestamp":"2026-02-16T02:07:06Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"85c9b89969"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.38/23\"],\"mac_address\":\"0a:58:0a:80:00:26\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.38/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.38\"\n ],\n \"mac\": \"0a:58:0a:80:00:26\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-85c9b89969","uid":"d66d9e41-625e-46d2-bca0-c2250403f71b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-kf7tw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-kf7tw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-kf7tw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:08Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:06Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:47Z","reason":"ContainersNotReady","message":"containers with unready status: [manager]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:47Z","reason":"ContainersNotReady","message":"containers with unready status: [manager]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.38","podIPs":[{"ip":"10.128.0.38"}],"startTime":"2026-02-16T02:07:06Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T02:07:08Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://c271ac813a8f5a3a39832ee7ead6a7d3a824c336acfc0b6cc420bc51065ffc80","started":true,"volumeMounts":[{"name":"kube-api-access-kf7tw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-16T02:09:47Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"Kind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"de7feba5-a305-44cd-be63-f43120710c66\"\nI0216 02:07:39.016706 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"9d91bd40-68f4-4c52-bc28-b685a50ba751\"\nI0216 02:07:40.582277 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"9d91bd40-68f4-4c52-bc28-b685a50ba751\"\nE0216 02:08:34.131511 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0216 02:09:34.135948 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0216 02:09:46.508138 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"874e739e-aa79-448e-99df-fdcf28998f36\"\nI0216 02:09:47.122586 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0216 02:09:47.122752 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-16T02:07:07Z","finishedAt":"2026-02-16T02:09:47Z","containerID":"cri-o://940771c91c013a004b3132c01c764c048ed22316fa2e21d7b58deed65f3ed4cf"}},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","containerID":"cri-o://bb54fbd185420265f2400dbce5bb93b2c07ec50f3a0611291aab6640cc25bca3","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-kf7tw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-6fcf4c966-dctqr.json0000640000000000000000000002265315144476157025502 0ustar0000000000000000{"metadata":{"name":"network-operator-6fcf4c966-dctqr","generateName":"network-operator-6fcf4c966-","namespace":"openshift-network-operator","uid":"456e6c3a-c16c-470b-a0cd-bb79865b54f0","resourceVersion":"9273","creationTimestamp":"2026-02-16T02:05:16Z","labels":{"name":"network-operator","pod-template-hash":"6fcf4c966"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-6fcf4c966","uid":"ff4970b7-c04a-402d-85d0-4d94f3aad7b7","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-nl7r8","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67d1623cf33e4a5ecaa5ec7f1dae3af4e0e0478489b3a628de2062dca1473c7e"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67d61d27aa46f8c1f49f2f691ebeec6a8465c1506c83e876415fcf6be19c2d77"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae9731fa23b96fe0a08e198d4cab6bb4e4b81a006a45b1e68948ffcac4e0bf9c"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7862391b6b069f985d3ba652ff80f29fedce94493a013b8e464e2d7bde964da4"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a913cef121c9a6c3ddc57b01fc807bb042e5a903489c05f99e6e2da9e6ec0b98"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-nl7r8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:05:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:05:16Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:05:16Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T02:05:16Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-02-16T02:09:33Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0216 02:07:53.023317 1 cmd.go:250] Using service-serving-cert provided certificates\nI0216 02:07:53.023505 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 02:07:53.024053 1 observer_polling.go:159] Starting file observer\nI0216 02:07:53.053404 1 builder.go:298] network-operator version 4.18.0-202601171847.p2.gf63a7ff.assembly.stream.el9-f63a7ff-f63a7ffb316c9ca4359210ff5ea2c003dbe2d6a9\nF0216 02:08:23.392120 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-operator/leases/network-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-16T02:07:52Z","finishedAt":"2026-02-16T02:08:23Z","containerID":"cri-o://d6b8bd52621bc720ed9dc674f34ff05c02fea3c605d0d925e1c0610bec6f8610"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","containerID":"cri-o://0315328a7c0259163748331a3160b081a82efff7afa5ee439e110ed017ac4025","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-nl7r8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-kffmg.json0000640000000000000000000002463315144476157026003 0ustar0000000000000000{"metadata":{"name":"network-node-identity-kffmg","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"dbc5b101-936f-4bf3-bbf3-f30966b0ab50","resourceVersion":"9270","creationTimestamp":"2026-02-16T02:05:52Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"69d96c74cb","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"d54ab74e-1bbc-40c6-8d53-61b6299cbdd9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-jlnkb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-jlnkb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-jlnkb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:08Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:05:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:05:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T02:05:52Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-02-16T02:09:33Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"8gxg\"} reason=\"CSRApproved\"\nI0216 02:06:14.227575 1 approver.go:230] Finished syncing CSR csr-98gxg for master-0 node in 9.760054ms\nI0216 02:06:14.227765 1 approver.go:230] Finished syncing CSR csr-98gxg for unknown node in 110.793µs\nI0216 02:06:14.237840 1 approver.go:230] Finished syncing CSR csr-98gxg for unknown node in 55.531µs\nI0216 02:06:27.140183 1 recorder.go:104] \"CSR \\\"csr-xqfsp\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-xqfsp\"} reason=\"CSRApproved\"\nI0216 02:06:27.151940 1 approver.go:230] Finished syncing CSR csr-xqfsp for master-0 node in 12.296306ms\nI0216 02:06:27.152175 1 approver.go:230] Finished syncing CSR csr-xqfsp for unknown node in 113.513µs\nI0216 02:06:27.161900 1 approver.go:230] Finished syncing CSR csr-xqfsp for unknown node in 98.843µs\nE0216 02:08:23.652520 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0216 02:08:38.652191 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0216 02:08:38.652258 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0216 02:08:53.652849 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0216 02:08:53.652990 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-02-16T02:06:08Z","finishedAt":"2026-02-16T02:08:53Z","containerID":"cri-o://73c5d4096ed4f5f723bea74695c09c9920b7cf6836ef92fa2286119a88696c78"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","containerID":"cri-o://e2b95d6d9e0e9f98872131f6b8b2e0daa77ccd636475f9813d73f42413bc869a","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-jlnkb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-02-16T02:06:08Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","containerID":"cri-o://528daeba946749640ce2b81f6f5bcc37687cc1690c040b79308891be8d1c3952","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-jlnkb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513615144476157026275 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"382ca6ae-1a4e-4e7c-9a7d-dd7abff78dcb","resourceVersion":"3790","creationTimestamp":"2026-02-16T02:05:27Z","annotations":{"kubernetes.io/config.hash":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.mirror":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.seen":"2026-02-16T02:04:41.996660866Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c26f8467-b1c8-4080-ab76-7bbfaa57ed70","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T02:06:37Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T02:04:46Z","finishedAt":"2026-02-16T02:04:46Z","containerID":"cri-o://0a5e2f09da7456e3ddaab1d9e62abba19553e3d0c15bed35db33dc97212f0fb6"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://0a5e2f09da7456e3ddaab1d9e62abba19553e3d0c15bed35db33dc97212f0fb6","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-16T02:05:27Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0216 02:05:00.536411 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0216 02:05:00.536648 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0216 02:05:00.538527 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-02-16T02:05:00Z","finishedAt":"2026-02-16T02:05:00Z","containerID":"cri-o://1315b8b70fa662058fdbb3d25c0b57bbe5b7832e14fd3593c7b3c8b6954d366b"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://93fa1f75b959883173b882fc0c221239f90d8c0f0c6f464304aa368bf78625b2","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-c588d8cb4-nbjz6.json0000640000000000000000000002431115144476157025345 0ustar0000000000000000{"metadata":{"name":"ingress-operator-c588d8cb4-nbjz6","generateName":"ingress-operator-c588d8cb4-","namespace":"openshift-ingress-operator","uid":"04804a08-e3a5-46f3-abcb-967866834baa","resourceVersion":"9263","creationTimestamp":"2026-02-16T02:05:17Z","labels":{"name":"ingress-operator","pod-template-hash":"c588d8cb4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-c588d8cb4","uid":"7a07ce49-902c-4b95-addb-afde05621540","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-8rc6w","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-8rc6w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-8rc6w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:33Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:33Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-02-16T02:06:28Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-02-16T02:09:33Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":") has prevented the request from succeeding\nW0216 02:09:03.640418 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DaemonSet ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0216 02:09:03.640520 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Role ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0216 02:09:03.640577 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.RoleBinding ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0216 02:09:03.639908 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Secret ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0216 02:09:03.640140 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Deployment ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-16T02:09:03.640Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-02-16T02:09:03.641Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-02-16T02:09:03.645Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-02-16T02:09:03.645Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-02-16T02:07:02Z","finishedAt":"2026-02-16T02:09:03Z","containerID":"cri-o://87993edba6f07930300de55e54a0440afea4e88c5ea50fe933142a412c18bfd2"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","containerID":"cri-o://7c934fcf17603ba6880730036301dc7740655f1f475a9dcfef2ce3f1ec5f5b71","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8rc6w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T02:07:02Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://e7f0a0eea4d904b15f8bede1e9264a49ffd2a0b983dd56cce81b31ebad1fe28d","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8rc6w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-5f5f84757d-b47jp.json0000640000000000000000000002044115144476157033436 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-5f5f84757d-b47jp","generateName":"openshift-controller-manager-operator-5f5f84757d-","namespace":"openshift-controller-manager-operator","uid":"6c02961f-30ec-4405-b7fa-9c4192342ae9","resourceVersion":"9235","creationTimestamp":"2026-02-16T02:05:17Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"5f5f84757d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-5f5f84757d","uid":"40a51a08-8454-410b-99b8-9e3e066afaa8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-7llx6","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7llx6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:08:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:08:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-02-16T02:06:28Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-02-16T02:08:11Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":" APIVersion:\"apps/v1\", ResourceVersion:\"\", FieldPath:\"\"}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\" to \"Progressing: deployment/controller-manager: observed generation is 5, desired generation is 6.\\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\"\nI0216 02:08:10.566388 1 observer_polling.go:111] Observed file \"/var/run/secrets/serving-cert/tls.crt\" has been created (hash=\"d5da65af4c366fd4efa496b2cca3c75b273163a7945ae42cbecb1e077cce46a3\")\nW0216 02:08:10.566484 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created\nI0216 02:08:10.566597 1 observer_polling.go:111] Observed file \"/var/run/secrets/serving-cert/tls.key\" has been created (hash=\"d0bdfc930e87be7459eb6786438a631e5b275dcdcd2a8eb503ec3fcaba9b9bd6\")\nI0216 02:08:10.566654 1 genericapiserver.go:691] \"[graceful-termination] pre-shutdown hooks completed\" name=\"PreShutdownHooksStopped\"\nI0216 02:08:10.566728 1 genericapiserver.go:546] \"[graceful-termination] shutdown event\" name=\"ShutdownInitiated\"\nI0216 02:08:10.566777 1 object_count_tracker.go:151] \"StorageObjectCountTracker pruner is exiting\"\nI0216 02:08:10.566795 1 operator.go:151] Shutting down OpenShiftControllerManagerOperator\nI0216 02:08:10.566950 1 base_controller.go:181] Shutting down LoggingSyncer ...\nW0216 02:08:10.566987 1 builder.go:136] graceful termination failed, controllers failed with error: stopped\nI0216 02:08:10.567002 1 base_controller.go:181] Shutting down StatusSyncer_openshift-controller-manager ...\nI0216 02:08:10.567016 1 base_controller.go:159] All StatusSyncer_openshift-controller-manager post start hooks have been terminated\n","startedAt":"2026-02-16T02:06:40Z","finishedAt":"2026-02-16T02:08:10Z","containerID":"cri-o://4af3b63baf882cf9b9d02a791b48a2c854ad5ccd1fbd43903fb2e66b8e587e95"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","containerID":"cri-o://907bfaa35e251ac0a99127e043064ef8d7828048025a8b998d4e1bd9a8208385","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7llx6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-74b6595c6d-466x9.json0000640000000000000000000001670215144476157030071 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-74b6595c6d-466x9","generateName":"csi-snapshot-controller-74b6595c6d-","namespace":"openshift-cluster-storage-operator","uid":"a3065737-c7c0-4fbb-b484-f2a9204d4908","resourceVersion":"9312","creationTimestamp":"2026-02-16T02:06:54Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"74b6595c6d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.33/23\"],\"mac_address\":\"0a:58:0a:80:00:21\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.33/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.33\"\n ],\n \"mac\": \"0a:58:0a:80:00:21\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-74b6595c6d","uid":"e749a8ea-86e2-4c67-beea-c68dd59bcbba","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-w7276","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-w7276","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000170000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c7"},"runAsNonRoot":true,"fsGroup":1000170000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:06:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.33","podIPs":[{"ip":"10.128.0.33"}],"startTime":"2026-02-16T02:06:54Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-02-16T02:09:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler-leader\nI0216 02:07:02.515257 1 leader_election.go:184] \"became leader, starting\"\nI0216 02:07:02.515581 1 snapshot_controller_base.go:255] Starting snapshot controller\nI0216 02:07:02.515612 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 02:07:02.515669 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 02:07:02.517991 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotContent from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0216 02:07:02.518273 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160\nI0216 02:07:02.518585 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160\nI0216 02:07:02.518648 1 reflector.go:368] Caches populated for *v1.VolumeSnapshot from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0216 02:07:02.519793 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotClass from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nE0216 02:08:28.665597 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0216 02:09:28.669736 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-storage-operator/snapshot-controller-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io snapshot-controller-leader)\nI0216 02:09:41.667776 1 leaderelection.go:297] failed to renew lease openshift-cluster-storage-operator/snapshot-controller-leader: timed out waiting for the condition\nE0216 02:09:41.667973 1 leader_election.go:188] \"Stopped leading\"\n","startedAt":"2026-02-16T02:07:02Z","finishedAt":"2026-02-16T02:09:41Z","containerID":"cri-o://37393f3209e22fdba80463ac1612aee9793e0477a277020982d8df5dfbf209db"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","containerID":"cri-o://913a5d08144597878e120125e796f5de9a81becfa80d2751d362c9b509551b8f","started":true,"volumeMounts":[{"name":"kube-api-access-w7276","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-67bc7c997f-zc2br.json0000640000000000000000000002566215144476157025765 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-67bc7c997f-zc2br","generateName":"catalogd-controller-manager-67bc7c997f-","namespace":"openshift-catalogd","uid":"857357a1-dc98-4dd5-98b3-c94b1ddf9dec","resourceVersion":"9324","creationTimestamp":"2026-02-16T02:07:06Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"67bc7c997f"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.37/23\"],\"mac_address\":\"0a:58:0a:80:00:25\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.37/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.37\"\n ],\n \"mac\": \"0a:58:0a:80:00:25\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-67bc7c997f","uid":"894e7f41-71b9-405d-bb94-029c3b55dfb5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-lj6v2","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-lj6v2","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-lj6v2","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:08Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:06Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:47Z","reason":"ContainersNotReady","message":"containers with unready status: [manager]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:09:47Z","reason":"ContainersNotReady","message":"containers with unready status: [manager]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.37","podIPs":[{"ip":"10.128.0.37"}],"startTime":"2026-02-16T02:07:06Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T02:07:07Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://d63a8c86661f89a3a49c867fa184a4421a34ce6f73b059534b4b61541e8a7cb9","started":true,"volumeMounts":[{"name":"kube-api-access-lj6v2","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-16T02:09:47Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"g=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"a8634869-3333-4961-a191-170a80c97e30\"\nI0216 02:09:46.513242 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"63c19fe9-89ff-441c-b721-842e352c1320\"\nI0216 02:09:46.513330 1 clustercatalog_controller.go:214] \"unpack required: current ClusterCatalog status differs from expected status\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"63c19fe9-89ff-441c-b721-842e352c1320\"\nI0216 02:09:46.513386 1 main.go:250] \"using available authentication information for pulling image\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"63c19fe9-89ff-441c-b721-842e352c1320\"\nI0216 02:09:46.889711 1 containers_image.go:81] \"image already unpacked\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"63c19fe9-89ff-441c-b721-842e352c1320\" ref=\"registry.redhat.io/redhat/redhat-operator-index:v4.18\" digest=\"sha256:97930d07a108f20287bd5ceb046a5ab125604b2e3564077db9f7d7c077cc5852\"\nI0216 02:09:47.122828 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0216 02:09:47.122959 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-16T02:07:07Z","finishedAt":"2026-02-16T02:09:47Z","containerID":"cri-o://5636e1e80751f3a3c96789a21a3143daf15c7ab0cfa132d87dcb28a679f13f01"}},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","containerID":"cri-o://0f7ba85e2cd54b9d76dada87f2712d689c26beb2b9f0778369e602e1815aefe6","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-lj6v2","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/clusteroperator/storage.json0000640000000000000000000000131215144476157016314 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"7542270b-9e29-4c45-8cb4-d4263f934552","resourceVersion":"769","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315144476157016674 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"5f5bc67d-0d43-42c8-9edc-8d361b0751ab","resourceVersion":"4469","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:06:45Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:06:43Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:43Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:40Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000307615144476157024701 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"e38d507d-0754-42f6-9972-e5477a224a52","resourceVersion":"9070","generation":1,"creationTimestamp":"2026-02-16T02:01:28Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:07:21Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T02:07:21Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:07:48Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:07:22Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515144476157023472 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"a36207b8-d88b-406b-b3c6-f7d4aa0b5390","resourceVersion":"9160","generation":1,"creationTimestamp":"2026-02-16T02:01:27Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:07:21Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:07:51Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:21Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:07:21Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115144476157022056 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"5b56c2f1-f6e7-4ae2-b1f7-fb6f14275d95","resourceVersion":"7198","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:07:21Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:21Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:07:21Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:07:21Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315144476157020320 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"fc2bb47e-042d-4f33-b6d0-d613057f1602","resourceVersion":"833","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215144476157022454 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"92ac04f6-76bb-4a82-88b4-bc26a85733b0","resourceVersion":"8889","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:06:46Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 5, desired generation is 6.\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4."},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:21Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:46Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215144476157020652 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"83380116-f23c-46d9-b2c1-39a663f5c8bb","resourceVersion":"8732","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:07:40Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.53:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.53:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"openshift-apiserver","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415144476157015443 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"bea50c54-f7e0-473c-99b9-613ff5f1660d","resourceVersion":"7294","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:49Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:07:22Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:22Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:49Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:49Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115144476157017102 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"533008c3-df98-4fd9-aa8a-a37ec4aa584a","resourceVersion":"6236","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:06Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.32\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:07:06Z","reason":"AsExpected","message":"Cluster version is \"4.18.32\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:07:02Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315144476157016353 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"5cb525dc-6477-43b6-ab18-317035510d3a","resourceVersion":"7363","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-16T02:05:32Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:05:21Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:05:21Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:07:22Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:06:39Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715144476157017046 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"f141122f-69f1-4c7e-9c6a-18cbdaeb07d9","resourceVersion":"7099","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-02-16T02:07:21Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-02-16T02:07:21Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:07:21Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:07:21Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315144476157017143 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"df2d71d6-935e-4fb9-a6f2-8f599bfcb577","resourceVersion":"7246","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:07:21Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.32"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:21Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:07:21Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:07:21Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015144476157017515 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"9e7ca3e4-3154-4b13-ba0c-364c69ef65d8","resourceVersion":"825","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215144476157020115 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"03157e1e-606e-44f2-a018-15fc062013e1","resourceVersion":"9354","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.32"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371315144476157017032 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"07f5f409-18c8-448f-b7a0-841b6241aa95","resourceVersion":"9360","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315144476157022553 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"72cc4eaf-065d-4bb9-b375-bf65d25725c5","resourceVersion":"4642","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:06:47Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:06:47Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615144476157017563 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"66617499-4224-4dca-a2a0-6d33284ecd84","resourceVersion":"7593","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:06:57Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000560115144476157021374 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"8187f2f5-4213-4908-a221-679704e84220","resourceVersion":"9385","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:52Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): Timeout: request did not complete within requested timeout - context deadline exceeded\nKubeControllerManagerStaticResourcesDegraded: "},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:07:29Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T02:06:53Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:52Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:52Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715144476157017611 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"6a667a4b-5109-4152-8b9c-0acc33185b9e","resourceVersion":"6954","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:32Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:07:20Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T02:06:34Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:32Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T02:06:32Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415144476157016503 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"9dbf77ed-515c-4622-95d8-1cf139b1144d","resourceVersion":"719","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715144476157016341 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"775390e1-10fd-4e99-9285-ffdc1ecf1646","resourceVersion":"6338","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:07Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:07:05Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:07:07Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:07:05Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T02:07:05Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715144476157017606 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"7c58eeec-7d33-4eeb-8b6d-85f920232a65","resourceVersion":"831","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015144476157015600 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"959134e1-982a-4a2d-90dd-5d36fc0680eb","resourceVersion":"6875","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:07:18Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515144476157015450 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"841516df-2245-4dc3-800d-8975e185699f","resourceVersion":"7604","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:31Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:07:07Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:07:31Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:07:03Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715144476157021452 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"e337f8cb-3e30-48a1-be51-238e4785d666","resourceVersion":"6096","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:07:06Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:06Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"NoData"}],"versions":[{"name":"csi-snapshot-controller","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515144476157021631 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"fc3a6b58-6f78-434c-9f0e-df84caa84d76","resourceVersion":"9350","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:09:41Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:09:41Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:09:41Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:09:41Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215144476157016312 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"47e2f579-7ac1-4856-ae15-27924a90107f","resourceVersion":"722","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615144476157017752 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"6ab66d4c-fe72-4348-8144-0a3b39f29315","resourceVersion":"9373","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:45Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:06:45Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:06:45Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:45Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:45Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000265715144476157020506 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"ca2d2eed-a33a-4fa9-bb74-5dccdb20b130","resourceVersion":"9363","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected","message":"at version 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000001521615144476157020076 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"e4eff1ba-e489-4875-aca5-5870285a5f02","resourceVersion":"9348","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:09:49Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:09:49Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:09:49Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:09:49Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440115144476157021551 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"2f6e4af8-4d43-4983-80cd-eaaa44f55714","resourceVersion":"9377","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-02-16T02:09:41Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T02:09:41Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015144476157016612 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"6b630a0b-0ca2-4b31-b909-caf870060d57","resourceVersion":"9358","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:09:50Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-16T02:09:50Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000735715144476157017706 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"4e506a4b-bcd0-4d4c-a5b9-da4c4df3a6ea","resourceVersion":"6820","generation":1,"creationTimestamp":"2026-02-16T02:01:26Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.66.165:443/healthz\": dial tcp 172.30.66.165:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:07:06Z","reason":"APIServerDeployment_PodsUpdating","message":"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T02:06:42Z","reason":"APIServerDeployment_NoPod::APIServices_PreconditionNotReady::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.66.165:443/healthz\": dial tcp 172.30.66.165:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T02:06:41Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/pod/openshift-cluster-version/cluster-version-operator-649c4f5445-lzvc4.json0000640000000000000000000001342015144476157026635 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-649c4f5445-lzvc4","generateName":"cluster-version-operator-649c4f5445-","namespace":"openshift-cluster-version","uid":"ad700b17-ba2a-41d4-8bec-538a009a613b","resourceVersion":"7318","creationTimestamp":"2026-02-16T02:07:21Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"649c4f5445"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-649c4f5445","uid":"a34994eb-9224-492d-91e6-544b7c098012","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:22Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:22Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:22Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T02:07:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T02:07:21Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-16T02:07:22Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","containerID":"cri-o://0f4270e5e44e4ba946d497e39a29fcdd94ebfa1e344531fd5ab06971f1a503e0","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415144476157011040 0ustar000000000000000033f04855-45be-4bc9-b173-0e53fe44c9d9config/version.json0000640000000000000000000000721215144476157013105 0ustar0000000000000000{"metadata":{"name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","resourceVersion":"9286","generation":2,"creationTimestamp":"2026-02-16T02:00:50Z"},"spec":{"clusterID":"33f04855-45be-4bc9-b173-0e53fe44c9d9","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","url":"https://access.redhat.com/errata/RHSA-2026:1062","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-16T02:01:26Z","completionTime":null,"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","verified":false}],"observedGeneration":2,"versionHash":"mWssvFsfzgI=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-16T02:01:26Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-16T02:01:26Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-16T02:01:26Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-16T02:01:26Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T02:01:26Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-02-16T02:09:05Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cloud-controller-manager, cloud-credential, cluster-autoscaler, control-plane-machine-set, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 906): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 906): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (823 of 906): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (827 of 906): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T02:01:26Z","reason":"MultipleErrors","message":"Unable to apply 4.18.32: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515144476157023233 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115144476157025443 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715144476157025152 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715144476157025143 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315144476157022263 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515144476157026717 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115144476157023422 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115144476157023216 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115144476157025506 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615144476157025516 0ustar0000000000000000{"metadata":{"name":"edit","uid":"bf0304d7-b6f4-4669-9fa4-d8689cd099a8","resourceVersion":"8968","creationTimestamp":"2026-02-16T01:59:51Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315144476157025657 0ustar0000000000000000{"metadata":{"name":"admin","uid":"dc319055-a051-4705-a58b-8e320bc7ea57","resourceVersion":"8972","creationTimestamp":"2026-02-16T01:59:51Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315144476157023460 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"2c6abe77-b548-4bad-aaee-c33a6e6cf78a","resourceVersion":"5329","generation":1,"creationTimestamp":"2026-02-16T02:06:54Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015144476157022063 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"8315ada1-5c74-4d35-a21a-d296645d02ac","resourceVersion":"5305","generation":1,"creationTimestamp":"2026-02-16T02:06:54Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-16T02:06:54Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000174015144476157025132 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"c4f5ee02-fa41-46d7-bfd4-8d0296b3613d","resourceVersion":"9126","generation":1,"creationTimestamp":"2026-02-16T02:01:45Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2026-02-16T02:01:45Z","reason":"InsufficientPods","message":""}]}}config/authentication.json0000640000000000000000000000116415144476157014437 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"711398fe-a9f9-416f-a747-ab28514ead9c","resourceVersion":"973","generation":1,"creationTimestamp":"2026-02-16T02:01:30Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/node/master-0.json0000640000000000000000000000551415144476157014000 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"c26f8467-b1c8-4080-ab76-7bbfaa57ed70","resourceVersion":"9318","creationTimestamp":"2026-02-16T02:05:15Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-16T02:09:46Z","lastTransitionTime":"2026-02-16T02:05:15Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-16T02:09:46Z","lastTransitionTime":"2026-02-16T02:05:15Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-16T02:09:46Z","lastTransitionTime":"2026-02-16T02:05:15Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-16T02:09:46Z","lastTransitionTime":"2026-02-16T02:06:28Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.107.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202601202224-0","containerRuntimeVersion":"cri-o://1.31.13-3.rhaos4.18.gite0b87e5.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115144476157027764 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"84169ce5-c16b-49ef-b81b-c601ad4e2dab","resourceVersion":"6139","generation":1,"creationTimestamp":"2026-02-16T02:07:02Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T02:07:06Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-02-16T02:07:06Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-02-16T02:07:06Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T02:07:06Z","reason":"AsExpected"}]}}config/network.json0000640000000000000000000000117015144476157013106 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b16aca80-9872-4730-aaf7-fff2e03e3d2f","resourceVersion":"3200","generation":2,"creationTimestamp":"2026-02-16T02:00:46Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/oauth.json0000640000000000000000000000114415144476157012536 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"785362bd-4cd4-4630-a443-e63e495950fd","resourceVersion":"1598","generation":1,"creationTimestamp":"2026-02-16T02:01:44Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115144476157025312 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"54975437-3c38-4d7f-903d-15c66cc2ce93","resourceVersion":"4520","generation":2,"creationTimestamp":"2026-02-16T02:01:52Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515144476157026751 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"210c8a64-2b0b-4a85-bf8b-8d168b3fe441","resourceVersion":"6730","generation":1,"creationTimestamp":"2026-02-16T02:07:16Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"a8aa19e0-0094-4690-85d9-234e31437796","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715144476157024037 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"fb942afc-40b8-4194-b148-9b89dcc5d203","resourceVersion":"4521","generation":2,"creationTimestamp":"2026-02-16T02:05:35Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"a8aa19e0-0094-4690-85d9-234e31437796","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115144476157032122 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"b212b893-e50f-4cb0-9478-ea365ac49ea5","resourceVersion":"9362","generation":2,"creationTimestamp":"2026-02-16T02:09:50Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102615144476157025007 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"44bb8149-9d24-429e-ad91-c6723d275c99","resourceVersion":"9333","generation":2,"creationTimestamp":"2026-02-16T02:09:49Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/ingress.json0000640000000000000000000000043615144476157013073 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6be979b9-940b-44b4-b87a-1ccc5384149e","resourceVersion":"557","generation":1,"creationTimestamp":"2026-02-16T02:00:45Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/image.json0000640000000000000000000000111715144476157012500 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"c02f8cec-acf6-4735-90fe-72877fa63c33","resourceVersion":"1360","generation":1,"creationTimestamp":"2026-02-16T02:01:40Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/infrastructure.json0000640000000000000000000000106515144476157014500 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"200a3ca8-9aa0-4181-b704-7affce6afc64","resourceVersion":"543","generation":1,"creationTimestamp":"2026-02-16T02:00:44Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/machineconfigpools/worker.json0000640000000000000000000000106515144476157016600 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-16T02:09:50Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"9375","uid":"d655f3a6-fb2b-418a-b98f-4b117e94bb26"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117215144476157016561 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-16T02:09:50Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"9372","uid":"4ca608f4-6f63-44fb-99da-7406970da396"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/proxy.json0000640000000000000000000000031315144476157012574 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"baa5aff4-0a73-44b1-90c4-1f9307a66d00","resourceVersion":"561","generation":1,"creationTimestamp":"2026-02-16T02:00:46Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615144476157027514 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"cb31f4d1-8e35-4ba7-98d2-eef669800351","resourceVersion":"5533","generation":2,"creationTimestamp":"2026-02-16T02:06:57Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/schedulers/cluster.json0000640000000000000000000000052415144476157015241 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"e547c647-ee4c-4345-8077-5cd2265ea1c1","resourceVersion":"566","generation":1,"creationTimestamp":"2026-02-16T02:00:48Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/apiserver.json0000640000000000000000000000121615144476157013416 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"53fb6d16-3c4c-4b41-9ed6-3920b8152205","resourceVersion":"836","generation":1,"creationTimestamp":"2026-02-16T02:01:27Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4bff7866-0359-4bb8-85f1-15a244eab148"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}