--- apiVersion: apps/v1 items: - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "9" operator.openshift.io/spec-hash: 34c3e3a8115142e136c043ef08f89388abd45cdd3df5ecebc8e3b17456076831 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:35:17Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 57bfdb854 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:39:26Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:39:26Z" name: controller-manager-57bfdb854 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "17843" uid: 047ac3ce-1efa-4285-a54a-bad96891d710 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 57bfdb854 template: metadata: annotations: configmaps/client-ca: "7771" configmaps/config: "15706" configmaps/openshift-global-ca: "5093" configmaps/openshift-service-ca: "5865" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "4" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 57bfdb854 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "7" operator.openshift.io/spec-hash: e6eb926cb0f7c207da6f3db1fde8e7639a31b32f03d49975802f7de14d92d6d8 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:26:25Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 58fff6b545 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:27:15Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:27:15Z" name: controller-manager-58fff6b545 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "13118" uid: d55645ea-ac38-4a18-bb34-1119b68f04cd spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 58fff6b545 template: metadata: annotations: configmaps/client-ca: "7771" configmaps/config: "12001" configmaps/openshift-global-ca: "5093" configmaps/openshift-service-ca: "5865" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 58fff6b545 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "10" operator.openshift.io/spec-hash: b3c8daffd2f3be550b106782c975b9f850266a5c82dca62ef03ed99fc33dbf7a release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:39:26Z" generation: 2 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5cbdcbd8d7 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:39:26Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:39:29Z" name: controller-manager-5cbdcbd8d7 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "18017" uid: 3dbdc40a-363c-4b98-a2f4-ce1aa4c9882f spec: replicas: 1 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 5cbdcbd8d7 template: metadata: annotations: configmaps/client-ca: "7771" configmaps/config: "17777" configmaps/openshift-global-ca: "5093" configmaps/openshift-service-ca: "5865" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "5" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5cbdcbd8d7 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: availableReplicas: 1 fullyLabeledReplicas: 1 observedGeneration: 2 readyReplicas: 1 replicas: 1 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "4" operator.openshift.io/spec-hash: cb4c668e9025f7b88f867705680a04255676afc2415891fd71d1ac585ffcd9c4 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:20:38Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 65dbf9584 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:20:57Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:20:58Z" name: controller-manager-65dbf9584 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "6752" uid: 5877ee0e-59d6-414d-af92-1b42b1270625 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 65dbf9584 template: metadata: annotations: configmaps/client-ca: "5296" configmaps/config: "5626" configmaps/openshift-global-ca: "5093" configmaps/openshift-service-ca: "5025" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 65dbf9584 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "8" operator.openshift.io/spec-hash: d6545486df9416d38fd204175ee197cf89f602609e05011d7180b2f058657ec0 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:27:15Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 67d4b5c54d managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:35:36Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:35:36Z" name: controller-manager-67d4b5c54d namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "16029" uid: 03b65789-2b05-460f-9c50-36fcc96b8246 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 67d4b5c54d template: metadata: annotations: configmaps/client-ca: "7771" configmaps/config: "12999" configmaps/openshift-global-ca: "5093" configmaps/openshift-service-ca: "5865" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "3" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 67d4b5c54d name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "3" operator.openshift.io/spec-hash: 0da447634d77bb5b14aa0fff1b12c9ae8490ff09e49a4da51974caba4754326e release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:20:36Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6f75697dcf managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:20:38Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:20:38Z" name: controller-manager-6f75697dcf namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "5706" uid: 8de60e8f-6f6f-4cf7-9cfa-6c024221e0c3 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 6f75697dcf template: metadata: annotations: configmaps/client-ca: "5296" configmaps/config: "5294" configmaps/openshift-global-ca: "5093" configmaps/openshift-service-ca: "5025" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6f75697dcf name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "6" operator.openshift.io/spec-hash: 227977362d89264c6478d6ec825b9e3222a98e0bf7a4a07c16a4e50c62be9b00 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:21:17Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6f9655dc5d managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:26:25Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:26:25Z" name: controller-manager-6f9655dc5d namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "12034" uid: 420125ba-8d38-4ef9-a723-97a3cb86ae55 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 6f9655dc5d template: metadata: annotations: configmaps/client-ca: "7771" configmaps/config: "6696" configmaps/openshift-global-ca: "5093" configmaps/openshift-service-ca: "5865" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6f9655dc5d name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "5" operator.openshift.io/spec-hash: 1d91332f8f1cda166047b37664d838863f3bf8c22d1f7a861abeb7ce4cf65b3d release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:20:57Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 7fcf878b4 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:21:17Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:21:17Z" name: controller-manager-7fcf878b4 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "7822" uid: ab77729e-1f0d-43aa-b105-371ef76a422e spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 7fcf878b4 template: metadata: annotations: configmaps/client-ca: "5296" configmaps/config: "6696" configmaps/openshift-global-ca: "5093" configmaps/openshift-service-ca: "5865" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 7fcf878b4 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "1" operator.openshift.io/spec-hash: c163ad792d36d9150385e5f8026d9fee4ea889e3a6ae36e9e358b0b16bcd92fd release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:20:18Z" generation: 2 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 84f7754698 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:20:35Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:20:35Z" name: controller-manager-84f7754698 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "5145" uid: 2d487cad-19d4-4c41-a38b-8ae7a23d0d60 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 84f7754698 template: metadata: annotations: openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 84f7754698 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "2" operator.openshift.io/spec-hash: 9101f7a8a78e531979e5bb0b8cfa3c7cc46f2bffe1dd771c3a595a2b0d0e2770 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-19T09:20:35Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 866d56f9b managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"d7bee97c-1130-4248-8d5d-ba9357921350"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-19T09:20:36Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-19T09:20:36Z" name: controller-manager-866d56f9b namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: d7bee97c-1130-4248-8d5d-ba9357921350 resourceVersion: "5358" uid: e874f5dc-1d22-4594-ba68-164efd941f2b spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 866d56f9b template: metadata: annotations: configmaps/client-ca: "4985" configmaps/config: "4895" configmaps/openshift-global-ca: "5043" configmaps/openshift-service-ca: "5025" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 866d56f9b name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 kind: ReplicaSetList metadata: resourceVersion: "76127"