--- apiVersion: v1 items: - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.128.0.138/23"],"mac_address":"0a:58:0a:80:00:8a","gateway_ips":["10.128.0.1"],"routes":[{"dest":"10.128.0.0/16","nextHop":"10.128.0.1"},{"dest":"172.30.0.0/16","nextHop":"10.128.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.128.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.128.0.1"}],"ip_address":"10.128.0.138/23","gateway_ip":"10.128.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.128.0.138" ], "mac": "0a:58:0a:80:00:8a", "default": true, "dns": {} }] openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default creationTimestamp: "2026-02-16T02:33:08Z" generateName: controller-69bbfbf88f- labels: app: metallb component: controller pod-template-hash: 69bbfbf88f managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:generateName: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"dd4b6aa0-7c10-4f5e-82df-9fd69bb58a24"}: {} f:spec: f:containers: k:{"name":"controller"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"METALLB_BGP_TYPE"}: .: {} f:name: {} f:value: {} k:{"name":"METALLB_DEPLOYMENT"}: .: {} f:name: {} f:value: {} k:{"name":"METALLB_ML_SECRET_NAME"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":9443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} k:{"containerPort":29150,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/tmp/k8s-webhook-server/serving-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":9120,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/metrics"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:nodeSelector: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:volumes: .: {} k:{"name":"cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"metrics-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-16T02:33:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: master-0 operation: Update subresource: status time: "2026-02-16T02:33:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-02-16T02:33:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.128.0.138"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-02-16T02:33:19Z" name: controller-69bbfbf88f-rz89s namespace: metallb-system ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: controller-69bbfbf88f uid: dd4b6aa0-7c10-4f5e-82df-9fd69bb58a24 resourceVersion: "23450" uid: 18768123-7a96-4518-b12c-bf696c0449db spec: containers: - args: - --port=29150 - --log-level=debug - --webhook-mode=disabled - --tls-min-version=VersionTLS12 command: - /controller env: - name: METALLB_ML_SECRET_NAME value: metallb-memberlist - name: METALLB_DEPLOYMENT value: controller - name: METALLB_BGP_TYPE value: frr-k8s image: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller ports: - containerPort: 29150 name: monitoring protocol: TCP - containerPort: 9443 name: webhook-server protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: {} securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true runAsUser: 1000770000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: cert readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-92vph readOnly: true - args: - --logtostderr - --secure-listen-address=:9120 - --upstream=http://127.0.0.1:29150/ - --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - --tls-private-key-file=/etc/metrics/tls.key - --tls-cert-file=/etc/metrics/tls.crt image: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:d887865ef3f02e69de8e9a95ec6504a29fcd3a32bef934d73b8f29684dbb9b95 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 9120 name: metricshttps protocol: TCP resources: requests: cpu: 10m memory: 20Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000770000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/metrics name: metrics-certs readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-92vph readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true nodeName: master-0 nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000770000 runAsNonRoot: true seLinuxOptions: level: s0:c28,c7 seccompProfile: type: RuntimeDefault serviceAccount: controller serviceAccountName: controller terminationGracePeriodSeconds: 0 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: cert secret: defaultMode: 420 secretName: metallb-webhook-cert - name: metrics-certs secret: defaultMode: 420 secretName: controller-certs-secret - name: kube-api-access-92vph projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:12Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:08Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:19Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:19Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:08Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://01bb0e4b726be16008dce2158911ec9d1aca1898cab47c9b964bbad40d026ff8 image: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e imageID: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e lastState: {} name: controller ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:09Z" volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: cert readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-92vph readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://b1218459fc36fa25a4cdaff97bf4163907d23c1e3a45497ef0607a56bee81c2a image: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:d887865ef3f02e69de8e9a95ec6504a29fcd3a32bef934d73b8f29684dbb9b95 imageID: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52 lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:12Z" volumeMounts: - mountPath: /etc/metrics name: metrics-certs readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-92vph readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.32.10 hostIPs: - ip: 192.168.32.10 phase: Running podIP: 10.128.0.138 podIPs: - ip: 10.128.0.138 qosClass: Burstable startTime: "2026-02-16T02:33:08Z" - apiVersion: v1 kind: Pod metadata: annotations: openshift.io/scc: privileged creationTimestamp: "2026-02-16T02:33:08Z" generateName: frr-k8s- labels: app: frr-k8s component: frr-k8s controller-revision-hash: 544df6c665 pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:generateName: {} f:labels: .: {} f:app: {} f:component: {} f:controller-revision-hash: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"d9221166-6b7f-4e8c-93be-68c88a57cace"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"FRR_CONFIG_FILE"}: .: {} f:name: {} f:value: {} k:{"name":"FRR_RELOADER_PID_FILE"}: .: {} f:name: {} f:value: {} k:{"name":"NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"NODE_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:host: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":7572,"protocol":"TCP"}: .: {} f:containerPort: {} f:hostPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:host: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:add: {} f:drop: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/frr_reloader"}: .: {} f:mountPath: {} f:name: {} k:{"name":"frr"}: .: {} f:command: {} f:env: .: {} k:{"name":"TINI_SUBREAPER"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:host: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:resources: {} f:securityContext: .: {} f:capabilities: .: {} f:add: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:host: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/frr"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/frr"}: .: {} f:mountPath: {} f:name: {} k:{"name":"frr-metrics"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":7573,"protocol":"TCP"}: .: {} f:containerPort: {} f:hostPort: {} f:name: {} f:protocol: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/frr"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/etc/frr_metrics"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/frr"}: .: {} f:mountPath: {} f:name: {} k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":9140,"protocol":"TCP"}: .: {} f:containerPort: {} f:hostPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/metrics"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"name":"kube-rbac-proxy-frr"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":9141,"protocol":"TCP"}: .: {} f:containerPort: {} f:hostPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/metrics"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"name":"reloader"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/frr"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/etc/frr_reloader"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/frr"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:hostNetwork: {} f:initContainers: .: {} k:{"name":"cp-frr-files"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:securityContext: .: {} f:runAsGroup: {} f:runAsUser: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/frr"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/tmp/frr"}: .: {} f:mountPath: {} f:name: {} k:{"name":"cp-metrics"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/frr_metrics"}: .: {} f:mountPath: {} f:name: {} k:{"name":"cp-reloader"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/frr_reloader"}: .: {} f:mountPath: {} f:name: {} f:nodeSelector: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:shareProcessNamespace: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"frr-conf"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"frr-sockets"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"frr-startup"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"metrics"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"metrics-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"reloader"}: .: {} f:emptyDir: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-02-16T02:33:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:initContainerStatuses: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"192.168.32.10"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-02-16T02:33:39Z" name: frr-k8s-dvzts namespace: metallb-system ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: frr-k8s uid: d9221166-6b7f-4e8c-93be-68c88a57cace resourceVersion: "23744" uid: 5edbab06-c9ca-47ce-88ea-85c0ee5381f6 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - master-0 containers: - args: - --node-name=$(NODE_NAME) - --namespace=$(NAMESPACE) - --metrics-bind-address=127.0.0.1:7572 - --log-level=debug command: - /frr-k8s env: - name: FRR_CONFIG_FILE value: /etc/frr_reloader/frr.conf - name: FRR_RELOADER_PID_FILE value: /etc/frr_reloader/reloader.pid - name: NODE_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: spec.nodeName - name: NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: host: 127.0.0.1 path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller ports: - containerPort: 7572 hostPort: 7572 name: monitoring protocol: TCP readinessProbe: failureThreshold: 3 httpGet: host: 127.0.0.1 path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: {} securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_RAW drop: - ALL readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/frr_reloader name: reloader - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true - command: - /bin/sh - -c - | /sbin/tini -- /usr/lib/frr/docker-start & attempts=0 until [[ -f /etc/frr/frr.log || $attempts -eq 60 ]]; do sleep 1 attempts=$(( $attempts + 1 )) done tail -f /etc/frr/frr.log env: - name: TINI_SUBREAPER value: "true" image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: host: 127.0.0.1 path: /livez port: 7573 scheme: HTTP periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: frr resources: {} securityContext: capabilities: add: - NET_ADMIN - NET_RAW - SYS_ADMIN - NET_BIND_SERVICE startupProbe: failureThreshold: 30 httpGet: host: 127.0.0.1 path: /livez port: 7573 scheme: HTTP periodSeconds: 5 successThreshold: 1 timeoutSeconds: 1 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/frr name: frr-sockets - mountPath: /etc/frr name: frr-conf - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true - command: - /etc/frr_reloader/frr-reloader.sh image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imagePullPolicy: IfNotPresent name: reloader resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/frr name: frr-sockets - mountPath: /etc/frr name: frr-conf - mountPath: /etc/frr_reloader name: reloader - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true - args: - --metrics-port=7573 - --metrics-bind-address=127.0.0.1 command: - /etc/frr_metrics/frr-metrics image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imagePullPolicy: IfNotPresent name: frr-metrics ports: - containerPort: 7573 hostPort: 7573 name: monitoring protocol: TCP resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/run/frr name: frr-sockets - mountPath: /etc/frr name: frr-conf - mountPath: /etc/frr_metrics name: metrics - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true - args: - --logtostderr - --secure-listen-address=:9140 - --upstream=http://127.0.0.1:7572/ - --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - --tls-private-key-file=/etc/metrics/tls.key - --tls-cert-file=/etc/metrics/tls.crt image: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:d887865ef3f02e69de8e9a95ec6504a29fcd3a32bef934d73b8f29684dbb9b95 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 9140 hostPort: 9140 name: metricshttps protocol: TCP resources: requests: cpu: 10m memory: 20Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/metrics name: metrics-certs readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true - args: - --logtostderr - --secure-listen-address=:9141 - --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - --upstream=http://127.0.0.1:7573/ - --tls-private-key-file=/etc/metrics/tls.key - --tls-cert-file=/etc/metrics/tls.crt image: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:d887865ef3f02e69de8e9a95ec6504a29fcd3a32bef934d73b8f29684dbb9b95 imagePullPolicy: IfNotPresent name: kube-rbac-proxy-frr ports: - containerPort: 9141 hostPort: 9141 name: metricshttps protocol: TCP resources: requests: cpu: 10m memory: 20Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/metrics name: metrics-certs readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true hostNetwork: true initContainers: - command: - /bin/sh - -c - cp -rLf /tmp/frr/* /etc/frr/ image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imagePullPolicy: IfNotPresent name: cp-frr-files resources: {} securityContext: runAsGroup: 101 runAsNonRoot: true runAsUser: 100 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /tmp/frr name: frr-startup - mountPath: /etc/frr name: frr-conf - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true - command: - /bin/sh - -c - cp -f /frr-reloader.sh /etc/frr_reloader/ image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imagePullPolicy: IfNotPresent name: cp-reloader resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/frr_reloader name: reloader - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true - command: - /bin/sh - -c - cp -f /frr-metrics /etc/frr_metrics/ image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imagePullPolicy: IfNotPresent name: cp-metrics resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/frr_metrics name: metrics - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true nodeName: master-0 nodeSelector: kubernetes.io/os: linux node-role.kubernetes.io/worker: "" preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: frr-k8s-daemon serviceAccountName: frr-k8s-daemon shareProcessNamespace: true terminationGracePeriodSeconds: 0 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoSchedule key: node-role.kubernetes.io/control-plane operator: Exists - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists - effect: NoSchedule key: node.kubernetes.io/network-unavailable operator: Exists volumes: - emptyDir: {} name: frr-sockets - configMap: defaultMode: 420 name: frr-startup name: frr-startup - emptyDir: {} name: frr-conf - emptyDir: {} name: reloader - emptyDir: {} name: metrics - name: metrics-certs secret: defaultMode: 420 secretName: frr-k8s-certs-secret - name: kube-api-access-5z25d projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:17Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:20Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:39Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:39Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:08Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://b49e362dab407755d5168bc31910a1a84ec1ee55d73c28e5503b735dc72f9acb image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imageID: registry.redhat.io/openshift4/frr-rhel9@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf lastState: {} name: controller ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:20Z" volumeMounts: - mountPath: /etc/frr_reloader name: reloader - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://d41532d5cd2aa7be1e86d7521f277fa8a7873ccf53c7e276ea1a6000e5be418a image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imageID: registry.redhat.io/openshift4/frr-rhel9@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf lastState: {} name: frr ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:21Z" volumeMounts: - mountPath: /var/run/frr name: frr-sockets - mountPath: /etc/frr name: frr-conf - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://2db80755c66a07df4bf7aa97642eb3d7a886a2466226a2f72d2fbb7ada1b930f image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imageID: registry.redhat.io/openshift4/frr-rhel9@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf lastState: {} name: frr-metrics ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:21Z" volumeMounts: - mountPath: /var/run/frr name: frr-sockets - mountPath: /etc/frr name: frr-conf - mountPath: /etc/frr_metrics name: metrics - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://1d60c425c88fc368ff0226d2996635de2718ed355a05712ae918eb21fae4d2a7 image: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:d887865ef3f02e69de8e9a95ec6504a29fcd3a32bef934d73b8f29684dbb9b95 imageID: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52 lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:21Z" volumeMounts: - mountPath: /etc/metrics name: metrics-certs readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://3201871d548a2788e580de631711652662d872fcb73cb5407889b815b5f8eb6b image: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:d887865ef3f02e69de8e9a95ec6504a29fcd3a32bef934d73b8f29684dbb9b95 imageID: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52 lastState: {} name: kube-rbac-proxy-frr ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:22Z" volumeMounts: - mountPath: /etc/metrics name: metrics-certs readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://a978a78e6ca8daa522afde3611e0a486be7eedf10b1e9eb49f670eb0901bfef6 image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imageID: registry.redhat.io/openshift4/frr-rhel9@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf lastState: {} name: reloader ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:21Z" volumeMounts: - mountPath: /var/run/frr name: frr-sockets - mountPath: /etc/frr name: frr-conf - mountPath: /etc/frr_reloader name: reloader - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.32.10 hostIPs: - ip: 192.168.32.10 initContainerStatuses: - containerID: cri-o://132600cebc0a6fff6d07ed19989bda279ff4a90b45320bcad0037d086a91dfd2 image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imageID: registry.redhat.io/openshift4/frr-rhel9@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf lastState: {} name: cp-frr-files ready: true restartCount: 0 started: false state: terminated: containerID: cri-o://132600cebc0a6fff6d07ed19989bda279ff4a90b45320bcad0037d086a91dfd2 exitCode: 0 finishedAt: "2026-02-16T02:33:17Z" reason: Completed startedAt: "2026-02-16T02:33:17Z" volumeMounts: - mountPath: /tmp/frr name: frr-startup - mountPath: /etc/frr name: frr-conf - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://f7e3cb73d018e8ba074b3d529d7082d4afc6588b3f7c2a850dc0bd803ec0543f image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imageID: registry.redhat.io/openshift4/frr-rhel9@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf lastState: {} name: cp-reloader ready: true restartCount: 0 started: false state: terminated: containerID: cri-o://f7e3cb73d018e8ba074b3d529d7082d4afc6588b3f7c2a850dc0bd803ec0543f exitCode: 0 finishedAt: "2026-02-16T02:33:18Z" reason: Completed startedAt: "2026-02-16T02:33:18Z" volumeMounts: - mountPath: /etc/frr_reloader name: reloader - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://57a41347fd70b8da9318f9550a579038f6d3096e5e49a476adb836c5ac3f7075 image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imageID: registry.redhat.io/openshift4/frr-rhel9@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf lastState: {} name: cp-metrics ready: true restartCount: 0 started: false state: terminated: containerID: cri-o://57a41347fd70b8da9318f9550a579038f6d3096e5e49a476adb836c5ac3f7075 exitCode: 0 finishedAt: "2026-02-16T02:33:19Z" reason: Completed startedAt: "2026-02-16T02:33:19Z" volumeMounts: - mountPath: /etc/frr_metrics name: metrics - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-5z25d readOnly: true recursiveReadOnly: Disabled phase: Running podIP: 192.168.32.10 podIPs: - ip: 192.168.32.10 qosClass: Burstable startTime: "2026-02-16T02:33:08Z" - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.128.0.137/23"],"mac_address":"0a:58:0a:80:00:89","gateway_ips":["10.128.0.1"],"routes":[{"dest":"10.128.0.0/16","nextHop":"10.128.0.1"},{"dest":"172.30.0.0/16","nextHop":"10.128.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.128.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.128.0.1"}],"ip_address":"10.128.0.137/23","gateway_ip":"10.128.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.128.0.137" ], "mac": "0a:58:0a:80:00:89", "default": true, "dns": {} }] kubectl.kubernetes.io/default-container: frr-k8s-webhook-server openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default creationTimestamp: "2026-02-16T02:33:08Z" generateName: frr-k8s-webhook-server-78b44bf5bb- labels: component: frr-k8s-webhook-server pod-template-hash: 78b44bf5bb managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:kubectl.kubernetes.io/default-container: {} f:generateName: {} f:labels: .: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"ba94baca-8df6-4a47-b61e-02d28e89ef21"}: {} f:spec: f:containers: k:{"name":"frr-k8s-webhook-server"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":7572,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/tmp/k8s-webhook-server/serving-certs"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-16T02:33:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: master-0 operation: Update subresource: status time: "2026-02-16T02:33:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-02-16T02:33:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.128.0.137"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-02-16T02:33:29Z" name: frr-k8s-webhook-server-78b44bf5bb-nd8kr namespace: metallb-system ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: frr-k8s-webhook-server-78b44bf5bb uid: ba94baca-8df6-4a47-b61e-02d28e89ef21 resourceVersion: "23697" uid: 19493b3f-c29a-413d-84a0-dbd3edc939de spec: containers: - args: - --log-level=debug - --webhook-mode=onlywebhook - --disable-cert-rotation=true - --namespace=$(NAMESPACE) - --metrics-bind-address=:7572 command: - /frr-k8s env: - name: NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: frr-k8s-webhook-server ports: - containerPort: 7572 name: monitoring protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: {} securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true runAsUser: 1000770000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: cert readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-2sgwf readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true nodeName: master-0 preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000770000 runAsNonRoot: true seLinuxOptions: level: s0:c28,c7 seccompProfile: type: RuntimeDefault serviceAccount: frr-k8s-daemon serviceAccountName: frr-k8s-daemon terminationGracePeriodSeconds: 10 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoSchedule key: node-role.kubernetes.io/control-plane operator: Exists - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 volumes: - name: cert secret: defaultMode: 420 secretName: frr-k8s-webhook-server-cert - name: kube-api-access-2sgwf projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:17Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:08Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:29Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:29Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:08Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://6f263055f8db2f5371cbd64fd407546137a01fc9c71b97e44ed3b4612942430d image: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c imageID: registry.redhat.io/openshift4/frr-rhel9@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf lastState: {} name: frr-k8s-webhook-server ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:17Z" volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: cert readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-2sgwf readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.32.10 hostIPs: - ip: 192.168.32.10 phase: Running podIP: 10.128.0.137 podIPs: - ip: 10.128.0.137 qosClass: BestEffort startTime: "2026-02-16T02:33:08Z" - apiVersion: v1 kind: Pod metadata: annotations: alm-examples: |- [ { "apiVersion": "frrk8s.metallb.io/v1beta1", "kind": "FRRConfiguration", "metadata": { "name": "basic", "namespace": "frr-k8s-system" }, "spec": { "bgp": { "routers": [ { "asn": 64512, "neighbors": [ { "address": "172.30.0.3", "asn": 64512, "port": 180, "toAdvertise": { "allowed": { "mode": "all" } }, "toReceive": { "allowed": { "mode": "all" } } } ] } ] } } }, { "apiVersion": "frrk8s.metallb.io/v1beta1", "kind": "FRRConfiguration", "metadata": { "name": "two-neighs", "namespace": "frr-k8s-system" }, "spec": { "bgp": { "routers": [ { "asn": 64512, "neighbors": [ { "address": "172.30.0.3", "asn": 4200000000, "ebgpMultiHop": true, "port": 180, "toAdvertise": { "allowed": { "mode": "all" } } }, { "address": "172.18.0.6", "asn": 4200000000, "port": 179, "toAdvertise": { "allowed": { "prefixes": [ "192.168.2.0/24" ] } } } ], "prefixes": [ "192.168.2.0/24", "192.169.2.0/24" ] } ] } } }, { "apiVersion": "frrk8s.metallb.io/v1beta1", "kind": "FRRConfiguration", "metadata": { "name": "two-routers-vrf", "namespace": "frr-k8s-system" }, "spec": { "bgp": { "routers": [ { "asn": 64513, "neighbors": [ { "address": "172.32.0.3", "asn": 4200000000, "ebgpMultiHop": true, "port": 180, "toAdvertise": { "allowed": { "mode": "all" } } } ], "prefixes": [ "192.168.2.0/24", "192.169.2.0/24" ] }, { "asn": 64515, "neighbors": [ { "address": "172.31.0.3", "asn": 4200000000, "port": 179, "toAdvertise": { "allowed": { "mode": "all" } } } ], "prefixes": [ "192.168.2.0/24", "192.169.2.0/24" ], "vrf": "red" } ] } } }, { "apiVersion": "frrk8s.metallb.io/v1beta1", "kind": "FRRNodeState", "metadata": { "name": "frr-k8s-worker" }, "status": { "lastConversionResult": "success", "lastReloadResult": "success", "runningConfig": "Building configuration...\n\nCurrent configuration:\n!\nfrr version 9.0.2_git\nfrr defaults traditional\nhostname frr-k8s-worker\nlog file /etc/frr/frr.log informational\nlog timestamp precision 3\nno ipv6 forwarding\nservice integrated-vtysh-config\n!\nip nht resolve-via-default\n!\nipv6 nht resolve-via-default\n!\nend\n" } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BFDProfile", "metadata": { "name": "bfd-profile-sample", "namespace": "metallb-system" }, "spec": { "receiveInterval": 380, "transmitInterval": 270 } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample1", "namespace": "metallb-system" }, "spec": { "ipAddressPools": [ "ip-addresspool-sample1" ], "peers": [ "ebgp-single-hop0" ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample2", "namespace": "metallb-system" }, "spec": { "ipAddressPoolSelectors": [ { "matchLabels": { "test": "ipv6" } }, { "matchLabels": { "test": "ipv4" } } ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample3", "namespace": "metallb-system" }, "spec": { "aggregationLength": 32, "aggregationLengthV6": 128, "communities": [ "65535:65282" ], "ipAddressPools": [ "ip-addresspool-sample1" ], "localPref": 50 } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample4", "namespace": "metallb-system" }, "spec": { "aggregationLength": 32, "aggregationLengthV6": 128, "communities": [ "NO_ADVERTISE" ], "ipAddressPools": [ "ip-addresspool-sample1" ], "localPref": 50 } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample5", "namespace": "metallb-system" }, "spec": { "aggregationLength": 32, "aggregationLengthV6": 128, "ipAddressPools": [ "ip-addresspool-sample1" ], "nodeSelectors": [ { "matchLabels": { "kubernetes.io/hostname": "kind-control-plane" } }, { "matchLabels": { "kubernetes.io/hostname": "kind-worker" } } ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPPeer", "metadata": { "name": "bgp-peer-beta1", "namespace": "metallb-system" }, "spec": { "myASN": 64512, "peerASN": 64512, "peerAddress": "172.30.0.3" } }, { "apiVersion": "metallb.io/v1beta1", "kind": "Community", "metadata": { "name": "community1", "namespace": "metallb-system" }, "spec": { "communities": [ { "name": "NO_ADVERTISE", "value": "65535:65282" } ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "IPAddressPool", "metadata": { "name": "ip-addresspool-sample1", "namespace": "metallb-system" }, "spec": { "addresses": [ "192.168.10.0/24", "192.168.9.1-192.168.9.5", "fc00:f853:0ccd:e799::/124" ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "IPAddressPool", "metadata": { "labels": { "test": "ipv4" }, "name": "ip-addresspool-sample2", "namespace": "metallb-system" }, "spec": { "addresses": [ "172.20.0.100/24" ], "autoAssign": false } }, { "apiVersion": "metallb.io/v1beta1", "kind": "IPAddressPool", "metadata": { "labels": { "test": "ipv6" }, "name": "ip-addresspool-sample3", "namespace": "metallb-system" }, "spec": { "addresses": [ "2002:2:2::1-2002:2:2::100" ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "L2Advertisement", "metadata": { "name": "l2-adv-sample1", "namespace": "metallb-system" }, "spec": { "ipAddressPools": [ "ip-addresspool-sample1" ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "L2Advertisement", "metadata": { "name": "l2-adv-sample2", "namespace": "metallb-system" }, "spec": { "nodeSelectors": [ { "matchLabels": { "kubernetes.io/hostname": "kind-control-plane" } } ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "MetalLB", "metadata": { "name": "metallb", "namespace": "metallb-system" }, "spec": {} }, { "apiVersion": "metallb.io/v1beta2", "kind": "BGPPeer", "metadata": { "name": "bgp-peer-sample1", "namespace": "metallb-system" }, "spec": { "myASN": 64512, "peerASN": 64512, "peerAddress": "172.30.0.3" } }, { "apiVersion": "metallb.io/v1beta2", "kind": "BGPPeer", "metadata": { "name": "bgp-peer-sample2", "namespace": "metallb-system" }, "spec": { "bfdProfile": "bfd-profile-sample", "myASN": 64512, "peerASN": 64512, "peerAddress": "172.30.0.3" } }, { "apiVersion": "metallb.io/v1beta2", "kind": "BGPPeer", "metadata": { "name": "bgp-peer-sample3", "namespace": "metallb-system" }, "spec": { "holdTime": "9m0s", "keepaliveTime": "0s", "myASN": 64512, "passwordSecret": { "name": "secretname", "namespace": "metallb-system" }, "peerASN": 64512, "peerAddress": "172.30.0.3", "peerPort": 180 } } ] capabilities: Basic Install categories: Networking certified: "false" containerImage: registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:6fd3e59fedf58b8842b17604b513ee43c81fcbc339b342383098ea81109a8854 createdAt: "2023-06-06T15:25:00Z" description: An operator for deploying MetalLB on a kubernetes cluster. features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "false" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.128.0.128/23"],"mac_address":"0a:58:0a:80:00:80","gateway_ips":["10.128.0.1"],"routes":[{"dest":"10.128.0.0/16","nextHop":"10.128.0.1"},{"dest":"172.30.0.0/16","nextHop":"10.128.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.128.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.128.0.1"}],"ip_address":"10.128.0.128/23","gateway_ip":"10.128.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.128.0.128" ], "mac": "0a:58:0a:80:00:80", "default": true, "dns": {} }] olm.operatorGroup: metallb-operator olm.operatorNamespace: metallb-system olm.skipRange: '>=4.8.0 <4.18.0' olm.targetNamespaces: "" olmcahash: 98d4c0f1ec5b0824a3dcab80924e368d537a93974a3ec406066024150dc25610 openshift.io/required-scc: restricted-v2 openshift.io/scc: restricted-v2 operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"frrk8s.metallb.io","kind":"FRRConfiguration","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"frrk8s.metallb.io","kind":"FRRNodeState","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"BFDProfile","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"BGPAdvertisement","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"BGPPeer","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"BGPPeer","version":"v1beta2"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"Community","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"IPAddressPool","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"L2Advertisement","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"MetalLB","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"ServiceL2Status","version":"v1beta1"}},{"type":"olm.package","value":{"packageName":"metallb-operator","version":"4.18.0-202601302238"}}]}' operatorframework.io/suggested-namespace: metallb-system operators.openshift.io/valid-subscription: '["OpenShift Kubernetes Engine", "OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.34.1 operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/openshift/metallb-operator seccomp.security.alpha.kubernetes.io/pod: runtime/default support: Red Hat creationTimestamp: "2026-02-16T02:32:18Z" generateName: metallb-operator-controller-manager-77bb9bb66d- labels: control-plane: controller-manager pod-template-hash: 77bb9bb66d managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:alm-examples: {} f:capabilities: {} f:categories: {} f:certified: {} f:containerImage: {} f:createdAt: {} f:description: {} f:features.operators.openshift.io/disconnected: {} f:features.operators.openshift.io/fips-compliant: {} f:features.operators.openshift.io/proxy-aware: {} f:features.operators.openshift.io/tls-profiles: {} f:features.operators.openshift.io/token-auth-aws: {} f:features.operators.openshift.io/token-auth-azure: {} f:features.operators.openshift.io/token-auth-gcp: {} f:olm.operatorGroup: {} f:olm.operatorNamespace: {} f:olm.skipRange: {} f:olm.targetNamespaces: {} f:olmcahash: {} f:openshift.io/required-scc: {} f:operatorframework.io/properties: {} f:operatorframework.io/suggested-namespace: {} f:operators.openshift.io/valid-subscription: {} f:operators.operatorframework.io/builder: {} f:operators.operatorframework.io/project_layout: {} f:repository: {} f:support: {} f:generateName: {} f:labels: .: {} f:control-plane: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"a5513d3e-dffc-4cc4-b20a-c98733cd14a6"}: {} f:spec: f:containers: k:{"name":"manager"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"CONTROLLER_IMAGE"}: .: {} f:name: {} f:value: {} k:{"name":"DEPLOY_KUBE_RBAC_PROXIES"}: .: {} f:name: {} f:value: {} k:{"name":"DEPLOY_PODMONITORS"}: .: {} f:name: {} f:value: {} k:{"name":"DEPLOY_SERVICEMONITORS"}: .: {} f:name: {} f:value: {} k:{"name":"ENABLE_OPERATOR_WEBHOOK"}: .: {} f:name: {} f:value: {} k:{"name":"ENABLE_WEBHOOK"}: .: {} f:name: {} f:value: {} k:{"name":"FRR_HTTPS_METRICS_PORT"}: .: {} f:name: {} f:value: {} k:{"name":"FRR_IMAGE"}: .: {} f:name: {} f:value: {} k:{"name":"FRR_METRICS_PORT"}: .: {} f:name: {} f:value: {} k:{"name":"FRRK8S_IMAGE"}: .: {} f:name: {} f:value: {} k:{"name":"HTTPS_METRICS_PORT"}: .: {} f:name: {} f:value: {} k:{"name":"KUBE_RBAC_PROXY_IMAGE"}: .: {} f:name: {} f:value: {} k:{"name":"MEMBER_LIST_BIND_PORT"}: .: {} f:name: {} f:value: {} k:{"name":"METRICS_PORT"}: .: {} f:name: {} f:value: {} k:{"name":"OPERATOR_CONDITION_NAME"}: .: {} f:name: {} f:value: {} k:{"name":"OPERATOR_NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"SPEAKER_IMAGE"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":9443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/apiserver.local.config/certificates"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/tmp/k8s-webhook-server/serving-certs"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:volumes: .: {} k:{"name":"apiservice-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:items: {} f:secretName: {} k:{"name":"cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"webhook-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:items: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-16T02:32:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: master-0 operation: Update subresource: status time: "2026-02-16T02:32:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-02-16T02:32:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.128.0.128"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-02-16T02:33:00Z" name: metallb-operator-controller-manager-77bb9bb66d-68x8r namespace: metallb-system ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: metallb-operator-controller-manager-77bb9bb66d uid: a5513d3e-dffc-4cc4-b20a-c98733cd14a6 resourceVersion: "22236" uid: 35fa7fc2-7ff3-4c54-9b0c-0cd8c0983930 spec: containers: - args: - --enable-leader-election - --disable-cert-rotation=true command: - /manager env: - name: SPEAKER_IMAGE value: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e - name: CONTROLLER_IMAGE value: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e - name: FRR_IMAGE value: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c - name: KUBE_RBAC_PROXY_IMAGE value: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:d887865ef3f02e69de8e9a95ec6504a29fcd3a32bef934d73b8f29684dbb9b95 - name: DEPLOY_KUBE_RBAC_PROXIES value: "true" - name: FRRK8S_IMAGE value: registry.redhat.io/openshift4/frr-rhel9@sha256:49bc23355dd52c33ffbef1ade12bdf026c3975fe17bd019cd0586ce5269f4d9c - name: OPERATOR_NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace - name: DEPLOY_PODMONITORS value: "false" - name: DEPLOY_SERVICEMONITORS value: "true" - name: ENABLE_WEBHOOK value: "true" - name: ENABLE_OPERATOR_WEBHOOK value: "true" - name: METRICS_PORT value: "29150" - name: HTTPS_METRICS_PORT value: "9120" - name: FRR_METRICS_PORT value: "29151" - name: FRR_HTTPS_METRICS_PORT value: "9121" - name: MEMBER_LIST_BIND_PORT value: "9122" - name: OPERATOR_CONDITION_NAME value: metallb-operator.v4.18.0-202601302238 image: registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:6fd3e59fedf58b8842b17604b513ee43c81fcbc339b342383098ea81109a8854 imagePullPolicy: IfNotPresent name: manager ports: - containerPort: 9443 name: webhook-server protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8080 scheme: HTTP initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 50m memory: 20Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsNonRoot: true runAsUser: 1000770000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9pb8z readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true nodeName: master-0 preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000770000 seLinuxOptions: level: s0:c28,c7 seccompProfile: type: RuntimeDefault serviceAccount: manager-account serviceAccountName: manager-account terminationGracePeriodSeconds: 10 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - name: cert secret: defaultMode: 420 secretName: metallb-operator-webhook-server-cert - name: apiservice-cert secret: defaultMode: 420 items: - key: tls.crt path: apiserver.crt - key: tls.key path: apiserver.key secretName: metallb-operator-controller-manager-service-cert - name: webhook-cert secret: defaultMode: 420 items: - key: tls.crt path: tls.crt - key: tls.key path: tls.key secretName: metallb-operator-controller-manager-service-cert - name: kube-api-access-9pb8z projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-02-16T02:32:25Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-02-16T02:32:18Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:00Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:00Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-02-16T02:32:18Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://3ce7e8ab149373fcd83eb1b005e68a04730254ac4a55c63d83d196311d127b71 image: registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:6fd3e59fedf58b8842b17604b513ee43c81fcbc339b342383098ea81109a8854 imageID: registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:6fd3e59fedf58b8842b17604b513ee43c81fcbc339b342383098ea81109a8854 lastState: {} name: manager ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:32:24Z" volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-9pb8z readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.32.10 hostIPs: - ip: 192.168.32.10 phase: Running podIP: 10.128.0.128 podIPs: - ip: 10.128.0.128 qosClass: Burstable startTime: "2026-02-16T02:32:18Z" - apiVersion: v1 kind: Pod metadata: annotations: alm-examples: |- [ { "apiVersion": "frrk8s.metallb.io/v1beta1", "kind": "FRRConfiguration", "metadata": { "name": "basic", "namespace": "frr-k8s-system" }, "spec": { "bgp": { "routers": [ { "asn": 64512, "neighbors": [ { "address": "172.30.0.3", "asn": 64512, "port": 180, "toAdvertise": { "allowed": { "mode": "all" } }, "toReceive": { "allowed": { "mode": "all" } } } ] } ] } } }, { "apiVersion": "frrk8s.metallb.io/v1beta1", "kind": "FRRConfiguration", "metadata": { "name": "two-neighs", "namespace": "frr-k8s-system" }, "spec": { "bgp": { "routers": [ { "asn": 64512, "neighbors": [ { "address": "172.30.0.3", "asn": 4200000000, "ebgpMultiHop": true, "port": 180, "toAdvertise": { "allowed": { "mode": "all" } } }, { "address": "172.18.0.6", "asn": 4200000000, "port": 179, "toAdvertise": { "allowed": { "prefixes": [ "192.168.2.0/24" ] } } } ], "prefixes": [ "192.168.2.0/24", "192.169.2.0/24" ] } ] } } }, { "apiVersion": "frrk8s.metallb.io/v1beta1", "kind": "FRRConfiguration", "metadata": { "name": "two-routers-vrf", "namespace": "frr-k8s-system" }, "spec": { "bgp": { "routers": [ { "asn": 64513, "neighbors": [ { "address": "172.32.0.3", "asn": 4200000000, "ebgpMultiHop": true, "port": 180, "toAdvertise": { "allowed": { "mode": "all" } } } ], "prefixes": [ "192.168.2.0/24", "192.169.2.0/24" ] }, { "asn": 64515, "neighbors": [ { "address": "172.31.0.3", "asn": 4200000000, "port": 179, "toAdvertise": { "allowed": { "mode": "all" } } } ], "prefixes": [ "192.168.2.0/24", "192.169.2.0/24" ], "vrf": "red" } ] } } }, { "apiVersion": "frrk8s.metallb.io/v1beta1", "kind": "FRRNodeState", "metadata": { "name": "frr-k8s-worker" }, "status": { "lastConversionResult": "success", "lastReloadResult": "success", "runningConfig": "Building configuration...\n\nCurrent configuration:\n!\nfrr version 9.0.2_git\nfrr defaults traditional\nhostname frr-k8s-worker\nlog file /etc/frr/frr.log informational\nlog timestamp precision 3\nno ipv6 forwarding\nservice integrated-vtysh-config\n!\nip nht resolve-via-default\n!\nipv6 nht resolve-via-default\n!\nend\n" } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BFDProfile", "metadata": { "name": "bfd-profile-sample", "namespace": "metallb-system" }, "spec": { "receiveInterval": 380, "transmitInterval": 270 } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample1", "namespace": "metallb-system" }, "spec": { "ipAddressPools": [ "ip-addresspool-sample1" ], "peers": [ "ebgp-single-hop0" ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample2", "namespace": "metallb-system" }, "spec": { "ipAddressPoolSelectors": [ { "matchLabels": { "test": "ipv6" } }, { "matchLabels": { "test": "ipv4" } } ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample3", "namespace": "metallb-system" }, "spec": { "aggregationLength": 32, "aggregationLengthV6": 128, "communities": [ "65535:65282" ], "ipAddressPools": [ "ip-addresspool-sample1" ], "localPref": 50 } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample4", "namespace": "metallb-system" }, "spec": { "aggregationLength": 32, "aggregationLengthV6": 128, "communities": [ "NO_ADVERTISE" ], "ipAddressPools": [ "ip-addresspool-sample1" ], "localPref": 50 } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPAdvertisement", "metadata": { "name": "bgp-adv-sample5", "namespace": "metallb-system" }, "spec": { "aggregationLength": 32, "aggregationLengthV6": 128, "ipAddressPools": [ "ip-addresspool-sample1" ], "nodeSelectors": [ { "matchLabels": { "kubernetes.io/hostname": "kind-control-plane" } }, { "matchLabels": { "kubernetes.io/hostname": "kind-worker" } } ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "BGPPeer", "metadata": { "name": "bgp-peer-beta1", "namespace": "metallb-system" }, "spec": { "myASN": 64512, "peerASN": 64512, "peerAddress": "172.30.0.3" } }, { "apiVersion": "metallb.io/v1beta1", "kind": "Community", "metadata": { "name": "community1", "namespace": "metallb-system" }, "spec": { "communities": [ { "name": "NO_ADVERTISE", "value": "65535:65282" } ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "IPAddressPool", "metadata": { "name": "ip-addresspool-sample1", "namespace": "metallb-system" }, "spec": { "addresses": [ "192.168.10.0/24", "192.168.9.1-192.168.9.5", "fc00:f853:0ccd:e799::/124" ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "IPAddressPool", "metadata": { "labels": { "test": "ipv4" }, "name": "ip-addresspool-sample2", "namespace": "metallb-system" }, "spec": { "addresses": [ "172.20.0.100/24" ], "autoAssign": false } }, { "apiVersion": "metallb.io/v1beta1", "kind": "IPAddressPool", "metadata": { "labels": { "test": "ipv6" }, "name": "ip-addresspool-sample3", "namespace": "metallb-system" }, "spec": { "addresses": [ "2002:2:2::1-2002:2:2::100" ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "L2Advertisement", "metadata": { "name": "l2-adv-sample1", "namespace": "metallb-system" }, "spec": { "ipAddressPools": [ "ip-addresspool-sample1" ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "L2Advertisement", "metadata": { "name": "l2-adv-sample2", "namespace": "metallb-system" }, "spec": { "nodeSelectors": [ { "matchLabels": { "kubernetes.io/hostname": "kind-control-plane" } } ] } }, { "apiVersion": "metallb.io/v1beta1", "kind": "MetalLB", "metadata": { "name": "metallb", "namespace": "metallb-system" }, "spec": {} }, { "apiVersion": "metallb.io/v1beta2", "kind": "BGPPeer", "metadata": { "name": "bgp-peer-sample1", "namespace": "metallb-system" }, "spec": { "myASN": 64512, "peerASN": 64512, "peerAddress": "172.30.0.3" } }, { "apiVersion": "metallb.io/v1beta2", "kind": "BGPPeer", "metadata": { "name": "bgp-peer-sample2", "namespace": "metallb-system" }, "spec": { "bfdProfile": "bfd-profile-sample", "myASN": 64512, "peerASN": 64512, "peerAddress": "172.30.0.3" } }, { "apiVersion": "metallb.io/v1beta2", "kind": "BGPPeer", "metadata": { "name": "bgp-peer-sample3", "namespace": "metallb-system" }, "spec": { "holdTime": "9m0s", "keepaliveTime": "0s", "myASN": 64512, "passwordSecret": { "name": "secretname", "namespace": "metallb-system" }, "peerASN": 64512, "peerAddress": "172.30.0.3", "peerPort": 180 } } ] capabilities: Basic Install categories: Networking certified: "false" containerImage: registry.redhat.io/openshift4/metallb-rhel9-operator@sha256:6fd3e59fedf58b8842b17604b513ee43c81fcbc339b342383098ea81109a8854 createdAt: "2023-06-06T15:25:00Z" description: An operator for deploying MetalLB on a kubernetes cluster. features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "false" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.128.0.129/23"],"mac_address":"0a:58:0a:80:00:81","gateway_ips":["10.128.0.1"],"routes":[{"dest":"10.128.0.0/16","nextHop":"10.128.0.1"},{"dest":"172.30.0.0/16","nextHop":"10.128.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.128.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.128.0.1"}],"ip_address":"10.128.0.129/23","gateway_ip":"10.128.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.128.0.129" ], "mac": "0a:58:0a:80:00:81", "default": true, "dns": {} }] olm.operatorGroup: metallb-operator olm.operatorNamespace: metallb-system olm.skipRange: '>=4.8.0 <4.18.0' olm.targetNamespaces: "" olmcahash: 98d4c0f1ec5b0824a3dcab80924e368d537a93974a3ec406066024150dc25610 openshift.io/required-scc: restricted-v2 openshift.io/scc: restricted-v2 operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"frrk8s.metallb.io","kind":"FRRConfiguration","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"frrk8s.metallb.io","kind":"FRRNodeState","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"BFDProfile","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"BGPAdvertisement","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"BGPPeer","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"BGPPeer","version":"v1beta2"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"Community","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"IPAddressPool","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"L2Advertisement","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"MetalLB","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"metallb.io","kind":"ServiceL2Status","version":"v1beta1"}},{"type":"olm.package","value":{"packageName":"metallb-operator","version":"4.18.0-202601302238"}}]}' operatorframework.io/suggested-namespace: metallb-system operators.openshift.io/valid-subscription: '["OpenShift Kubernetes Engine", "OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.34.1 operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 prometheus.io/port: "7472" prometheus.io/scrape: "true" repository: https://github.com/openshift/metallb-operator seccomp.security.alpha.kubernetes.io/pod: runtime/default support: Red Hat creationTimestamp: "2026-02-16T02:32:20Z" generateName: metallb-operator-webhook-server-599c6f98c8- labels: app: metallb component: webhook-server pod-template-hash: 599c6f98c8 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:alm-examples: {} f:capabilities: {} f:categories: {} f:certified: {} f:containerImage: {} f:createdAt: {} f:description: {} f:features.operators.openshift.io/disconnected: {} f:features.operators.openshift.io/fips-compliant: {} f:features.operators.openshift.io/proxy-aware: {} f:features.operators.openshift.io/tls-profiles: {} f:features.operators.openshift.io/token-auth-aws: {} f:features.operators.openshift.io/token-auth-azure: {} f:features.operators.openshift.io/token-auth-gcp: {} f:olm.operatorGroup: {} f:olm.operatorNamespace: {} f:olm.skipRange: {} f:olm.targetNamespaces: {} f:olmcahash: {} f:openshift.io/required-scc: {} f:operatorframework.io/properties: {} f:operatorframework.io/suggested-namespace: {} f:operators.openshift.io/valid-subscription: {} f:operators.operatorframework.io/builder: {} f:operators.operatorframework.io/project_layout: {} f:prometheus.io/port: {} f:prometheus.io/scrape: {} f:repository: {} f:support: {} f:generateName: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"49d988a2-250f-4673-9d05-dcc1b9698b19"}: {} f:spec: f:containers: k:{"name":"webhook-server"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"METALLB_BGP_TYPE"}: .: {} f:name: {} f:value: {} k:{"name":"OPERATOR_CONDITION_NAME"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":7472,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} k:{"containerPort":9443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/apiserver.local.config/certificates"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/tmp/k8s-webhook-server/serving-certs"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:nodeSelector: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:volumes: .: {} k:{"name":"apiservice-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:items: {} f:secretName: {} k:{"name":"cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"webhook-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:items: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-16T02:32:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: master-0 operation: Update subresource: status time: "2026-02-16T02:32:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-02-16T02:32:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.128.0.129"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-02-16T02:32:41Z" name: metallb-operator-webhook-server-599c6f98c8-4w4b2 namespace: metallb-system ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: metallb-operator-webhook-server-599c6f98c8 uid: 49d988a2-250f-4673-9d05-dcc1b9698b19 resourceVersion: "21539" uid: a7b52d2c-3950-409f-b570-6eac039d4603 spec: containers: - args: - --disable-cert-rotation=true - --port=7472 - --log-level=info - --webhook-mode=onlywebhook command: - /controller env: - name: METALLB_BGP_TYPE value: frr - name: OPERATOR_CONDITION_NAME value: metallb-operator.v4.18.0-202601302238 image: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: webhook-server ports: - containerPort: 7472 name: monitoring protocol: TCP - containerPort: 9443 name: webhook-server protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: {} securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsNonRoot: true runAsUser: 1000770000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-fl8q4 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true nodeName: master-0 nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000770000 seLinuxOptions: level: s0:c28,c7 seccompProfile: type: RuntimeDefault serviceAccount: controller serviceAccountName: controller terminationGracePeriodSeconds: 0 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 volumes: - name: cert secret: defaultMode: 420 secretName: metallb-webhook-cert - name: apiservice-cert secret: defaultMode: 420 items: - key: tls.crt path: apiserver.crt - key: tls.key path: apiserver.key secretName: metallb-operator-webhook-server-service-cert - name: webhook-cert secret: defaultMode: 420 items: - key: tls.crt path: tls.crt - key: tls.key path: tls.key secretName: metallb-operator-webhook-server-service-cert - name: kube-api-access-fl8q4 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-02-16T02:32:28Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-02-16T02:32:20Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-02-16T02:32:41Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-02-16T02:32:41Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-02-16T02:32:20Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://86d7c9e28e6fc7a451d26925aa6f72c6bf3675706747cd430bc604973d0fe50f image: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e imageID: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e lastState: {} name: webhook-server ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:32:27Z" volumeMounts: - mountPath: /tmp/k8s-webhook-server/serving-certs name: webhook-cert - mountPath: /apiserver.local.config/certificates name: apiservice-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-fl8q4 readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.32.10 hostIPs: - ip: 192.168.32.10 phase: Running podIP: 10.128.0.129 podIPs: - ip: 10.128.0.129 qosClass: BestEffort startTime: "2026-02-16T02:32:20Z" - apiVersion: v1 kind: Pod metadata: annotations: openshift.io/scc: privileged creationTimestamp: "2026-02-16T02:33:08Z" generateName: speaker- labels: app: metallb component: speaker controller-revision-hash: ddf7db8cb pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:generateName: {} f:labels: .: {} f:app: {} f:component: {} f:controller-revision-hash: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"dae31a67-ca3c-43ec-ba9e-4f37ff90216f"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":9120,"protocol":"TCP"}: .: {} f:containerPort: {} f:hostPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/metrics"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"name":"speaker"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"METALLB_BGP_TYPE"}: .: {} f:name: {} f:value: {} k:{"name":"METALLB_HOST"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"METALLB_ML_BIND_ADDR"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"METALLB_ML_BIND_PORT"}: .: {} f:name: {} f:value: {} k:{"name":"METALLB_ML_LABELS"}: .: {} f:name: {} f:value: {} k:{"name":"METALLB_ML_SECRET_KEY_PATH"}: .: {} f:name: {} f:value: {} k:{"name":"METALLB_NODE_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"METALLB_POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:host: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":9122,"protocol":"TCP"}: .: {} f:containerPort: {} f:hostPort: {} f:name: {} f:protocol: {} k:{"containerPort":9122,"protocol":"UDP"}: .: {} f:containerPort: {} f:hostPort: {} f:name: {} f:protocol: {} k:{"containerPort":29150,"protocol":"TCP"}: .: {} f:containerPort: {} f:hostPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:host: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:add: {} f:drop: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/metallb"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/etc/ml_secret_key"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:hostNetwork: {} f:nodeSelector: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"memberlist"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"metallb-excludel2"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"metrics-certs"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-16T02:33:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"192.168.32.10"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-02-16T02:33:20Z" name: speaker-2gs6z namespace: metallb-system ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: speaker uid: dae31a67-ca3c-43ec-ba9e-4f37ff90216f resourceVersion: "23506" uid: 7bf5962c-cc36-4cf3-8ffe-e16bce282d53 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - master-0 containers: - args: - --port=29150 - --log-level=debug - --host=localhost command: - /speaker env: - name: METALLB_NODE_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: spec.nodeName - name: METALLB_HOST valueFrom: fieldRef: apiVersion: v1 fieldPath: status.hostIP - name: METALLB_ML_BIND_ADDR valueFrom: fieldRef: apiVersion: v1 fieldPath: status.podIP - name: METALLB_ML_LABELS value: app=metallb,component=speaker - name: METALLB_ML_BIND_PORT value: "9122" - name: METALLB_ML_SECRET_KEY_PATH value: /etc/ml_secret_key - name: METALLB_BGP_TYPE value: frr-k8s - name: METALLB_POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: host: localhost path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: speaker ports: - containerPort: 29150 hostPort: 29150 name: monitoring protocol: TCP - containerPort: 9122 hostPort: 9122 name: memberlist-tcp protocol: TCP - containerPort: 9122 hostPort: 9122 name: memberlist-udp protocol: UDP readinessProbe: failureThreshold: 3 httpGet: host: localhost path: /metrics port: monitoring scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: {} securityContext: allowPrivilegeEscalation: false capabilities: add: - NET_RAW drop: - ALL readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/ml_secret_key name: memberlist - mountPath: /etc/metallb name: metallb-excludel2 - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-v9n9f readOnly: true - args: - --logtostderr - --secure-listen-address=:9120 - --upstream=http://localhost:29150/ - --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - --tls-private-key-file=/etc/metrics/tls.key - --tls-cert-file=/etc/metrics/tls.crt image: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:d887865ef3f02e69de8e9a95ec6504a29fcd3a32bef934d73b8f29684dbb9b95 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 9120 hostPort: 9120 name: metricshttps protocol: TCP resources: requests: cpu: 10m memory: 20Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/metrics name: metrics-certs readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-v9n9f readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true hostNetwork: true nodeName: master-0 nodeSelector: kubernetes.io/os: linux node-role.kubernetes.io/worker: "" preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: speaker serviceAccountName: speaker terminationGracePeriodSeconds: 0 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoSchedule key: node-role.kubernetes.io/control-plane operator: Exists - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists - effect: NoSchedule key: node.kubernetes.io/network-unavailable operator: Exists volumes: - name: metrics-certs secret: defaultMode: 420 secretName: speaker-certs-secret - name: memberlist secret: defaultMode: 420 secretName: metallb-memberlist - configMap: defaultMode: 256 name: metallb-excludel2 name: metallb-excludel2 - name: kube-api-access-v9n9f projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:13Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:08Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:20Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:20Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-02-16T02:33:08Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://9a53d9b4ea5c88e29da4cdd45a48e5564326ade42990caa3b584667bf14316d8 image: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:d887865ef3f02e69de8e9a95ec6504a29fcd3a32bef934d73b8f29684dbb9b95 imageID: registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52 lastState: {} name: kube-rbac-proxy ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:12Z" volumeMounts: - mountPath: /etc/metrics name: metrics-certs readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-v9n9f readOnly: true recursiveReadOnly: Disabled - containerID: cri-o://1478eb704c0491dccea199101937b5701df6962bdaffb731a9b24f2a2138eaac image: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e imageID: registry.redhat.io/openshift4/metallb-rhel9@sha256:5734cf213934e92a65bb43f1e280bfdfb5b614a7ef55fedf26acdbc5c020092e lastState: {} name: speaker ready: true restartCount: 0 started: true state: running: startedAt: "2026-02-16T02:33:10Z" volumeMounts: - mountPath: /etc/ml_secret_key name: memberlist - mountPath: /etc/metallb name: metallb-excludel2 - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-v9n9f readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.32.10 hostIPs: - ip: 192.168.32.10 phase: Running podIP: 192.168.32.10 podIPs: - ip: 192.168.32.10 qosClass: Burstable startTime: "2026-02-16T02:33:08Z" kind: PodList metadata: resourceVersion: "55508"