insights-operator/gathers.json0000640000000000000000000006053015156762320015264 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/storage_cluster","duration_in_ms":11,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":63,"records_count":11,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11605,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":20,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":52,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":100,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":167,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":20,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":27,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":48,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":50,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":85,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":121,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":230,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":287,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":1,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":27,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":2,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":25,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":27,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":30,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":47,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10927,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":2,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":15,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":66,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":30,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":50,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":29,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":52,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5831,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5832,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":40,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":75,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":20669,"records_count":72,"errors":["the record with the same name \"events/openshift-machine-api.json\" was already recorded and had the fingerprint \"b99018459624f56d2da9decdbea3433482cf08dbf22b9b27771a7839a2f8888e\", overwriting with the record having fingerprint \"7c99151af2b80a17202b549cca5ad417c49ef7190296ffed2c8ad344001f532c\"","the record with the same name \"config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6.json\" was already recorded and had the fingerprint \"86c4d0cfd7bf7e9e50e9af5daf80f435c90c81a09662362cd87487674ee44443\", overwriting with the record having fingerprint \"86c4d0cfd7bf7e9e50e9af5daf80f435c90c81a09662362cd87487674ee44443\"","the record with the same name \"config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-866dc4744-fblgs/kube-rbac-proxy_current.log\" was already recorded and had the fingerprint \"55054b05e534b228c5822acb906d41ab935a526b7cb07b14190d648d2c5dea36\", overwriting with the record having fingerprint \"55054b05e534b228c5822acb906d41ab935a526b7cb07b14190d648d2c5dea36\"","the record with the same name \"config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-866dc4744-fblgs/cluster-autoscaler-operator_current.log\" was already recorded and had the fingerprint \"e11c4449be0841fdaf7698d9509b718a5dd8a6149e7b9c1126e71860f80fd8e5\", overwriting with the record having fingerprint \"9affda9fe12bf81fbd2c9689539e57fb28ae404f5d4d1a112065fcbaaf35aab7\"","the record with the same name \"config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6.json\" was already recorded and had the fingerprint \"86c4d0cfd7bf7e9e50e9af5daf80f435c90c81a09662362cd87487674ee44443\", overwriting with the record having fingerprint \"86c4d0cfd7bf7e9e50e9af5daf80f435c90c81a09662362cd87487674ee44443\"","the record with the same name \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/cluster-baremetal-operator_previous.log\" was already recorded and had the fingerprint \"f92e7ebf6c08c7ce4fafcf283f5f64efa45292d9f601cddd3757f6759920681b\", overwriting with the record having fingerprint \"f92e7ebf6c08c7ce4fafcf283f5f64efa45292d9f601cddd3757f6759920681b\"","the record with the same name \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/cluster-baremetal-operator_current.log\" was already recorded and had the fingerprint \"34038ee64a8cfd3be580d8232b591216e39b65264bc01fe3ab4c05ce59370f0f\", overwriting with the record having fingerprint \"34038ee64a8cfd3be580d8232b591216e39b65264bc01fe3ab4c05ce59370f0f\"","the record with the same name \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/baremetal-kube-rbac-proxy_current.log\" was already recorded and had the fingerprint \"d2ffea74903c1592621c2e7fa4d340a7a6c1d3cd6fc66aae21d23c5847de3081\", overwriting with the record having fingerprint \"d2ffea74903c1592621c2e7fa4d340a7a6c1d3cd6fc66aae21d23c5847de3081\"","the record with the same name \"config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-6f97756bc8-tql86/control-plane-machine-set-operator_current.log\" was already recorded and had the fingerprint \"bc33d9fbf02d1e2340d6e87a4e72db0351983fe5831f1aabdffe49ecbc90e0d9\", overwriting with the record having fingerprint \"bc33d9fbf02d1e2340d6e87a4e72db0351983fe5831f1aabdffe49ecbc90e0d9\"","the record with the same name \"config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c/kube-rbac-proxy_current.log\" was already recorded and had the fingerprint \"79ee06864f1f067d82f3486406718bd2011b347c4d802593874e0e9108ac3c79\", overwriting with the record having fingerprint \"79ee06864f1f067d82f3486406718bd2011b347c4d802593874e0e9108ac3c79\"","the record with the same name \"config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c/machine-api-operator_current.log\" was already recorded and had the fingerprint \"a4077979e899593d314dc843ac1459d6dec556b73824e5585f1fa7448856d1e1\", overwriting with the record having fingerprint \"a4077979e899593d314dc843ac1459d6dec556b73824e5585f1fa7448856d1e1\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-sc4kz.json\" was already recorded and had the fingerprint \"5d3c98e99b488263c6b46e97e006cb04c8302d80283299b95f1b99efc105cbc8\", overwriting with the record having fingerprint \"5d3c98e99b488263c6b46e97e006cb04c8302d80283299b95f1b99efc105cbc8\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_previous.log\" was already recorded and had the fingerprint \"d853f4f01c969fd5e43c819ccdb3cf18c4c61a11504ca6239270431420142f27\", overwriting with the record having fingerprint \"d853f4f01c969fd5e43c819ccdb3cf18c4c61a11504ca6239270431420142f27\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_current.log\" was already recorded and had the fingerprint \"565ee1778d3c223eb398fa023f6692a495ec18b5af42524334c05cbf4bf0aad3\", overwriting with the record having fingerprint \"565ee1778d3c223eb398fa023f6692a495ec18b5af42524334c05cbf4bf0aad3\""],"warnings":["warning: the record with the same fingerprint \"86c4d0cfd7bf7e9e50e9af5daf80f435c90c81a09662362cd87487674ee44443\" was already recorded at path \"config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6.json\", recording another one with a different path \"config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6.json\"","warning: the record with the same fingerprint \"55054b05e534b228c5822acb906d41ab935a526b7cb07b14190d648d2c5dea36\" was already recorded at path \"config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-866dc4744-fblgs/kube-rbac-proxy_current.log\", recording another one with a different path \"config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-866dc4744-fblgs/kube-rbac-proxy_current.log\"","warning: the record with the same fingerprint \"86c4d0cfd7bf7e9e50e9af5daf80f435c90c81a09662362cd87487674ee44443\" was already recorded at path \"config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6.json\", recording another one with a different path \"config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6.json\"","warning: the record with the same fingerprint \"f92e7ebf6c08c7ce4fafcf283f5f64efa45292d9f601cddd3757f6759920681b\" was already recorded at path \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/cluster-baremetal-operator_previous.log\", recording another one with a different path \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/cluster-baremetal-operator_previous.log\"","warning: the record with the same fingerprint \"34038ee64a8cfd3be580d8232b591216e39b65264bc01fe3ab4c05ce59370f0f\" was already recorded at path \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/cluster-baremetal-operator_current.log\", recording another one with a different path \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/cluster-baremetal-operator_current.log\"","warning: the record with the same fingerprint \"d2ffea74903c1592621c2e7fa4d340a7a6c1d3cd6fc66aae21d23c5847de3081\" was already recorded at path \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/baremetal-kube-rbac-proxy_current.log\", recording another one with a different path \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/baremetal-kube-rbac-proxy_current.log\"","warning: the record with the same fingerprint \"bc33d9fbf02d1e2340d6e87a4e72db0351983fe5831f1aabdffe49ecbc90e0d9\" was already recorded at path \"config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-6f97756bc8-tql86/control-plane-machine-set-operator_current.log\", recording another one with a different path \"config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-6f97756bc8-tql86/control-plane-machine-set-operator_current.log\"","warning: the record with the same fingerprint \"79ee06864f1f067d82f3486406718bd2011b347c4d802593874e0e9108ac3c79\" was already recorded at path \"config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c/kube-rbac-proxy_current.log\", recording another one with a different path \"config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c/kube-rbac-proxy_current.log\"","warning: the record with the same fingerprint \"a4077979e899593d314dc843ac1459d6dec556b73824e5585f1fa7448856d1e1\" was already recorded at path \"config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c/machine-api-operator_current.log\", recording another one with a different path \"config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c/machine-api-operator_current.log\"","warning: the record with the same fingerprint \"5d3c98e99b488263c6b46e97e006cb04c8302d80283299b95f1b99efc105cbc8\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-sc4kz.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-sc4kz.json\"","warning: the record with the same fingerprint \"d853f4f01c969fd5e43c819ccdb3cf18c4c61a11504ca6239270431420142f27\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"565ee1778d3c223eb398fa023f6692a495ec18b5af42524334c05cbf4bf0aad3\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_current.log\""],"panic":null},{"name":"clusterconfig","duration_in_ms":20675,"records_count":166,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"support_secret\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"tsdb_status\" failed with an error","function \"silenced_alerts\" failed with an error","function \"metrics\" failed with an error","function \"active_alerts\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"events/openshift-machine-api.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-866dc4744-fblgs/kube-rbac-proxy_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-866dc4744-fblgs/cluster-autoscaler-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/cluster-baremetal-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/cluster-baremetal-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml6/baremetal-kube-rbac-proxy_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-6f97756bc8-tql86/control-plane-machine-set-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c/kube-rbac-proxy_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c/machine-api-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-sc4kz.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":30,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":210,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":5,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":132,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":11,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":47,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":28.073,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515156762320017771 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515156762320021073 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005536115156762317014264 0ustar0000000000000000{"pods":81,"imageCount":68,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:c9f7bbe4799eaacbfbb60eb906000d7a813a580d6a9740def7da774cbc4cf859","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:aefc421cf2f5dba925f7c149d56ce14e910fbd969a4e22b5917fc912ca33a5b2","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:3ea089ab116e164d89b46dc077f87d9af22f525bc2d69403214f77ee3fd30161","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"terminalCount":1,"shapes":[]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":7,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f264240fe2a46d7aa95e56ee202a8403c3dad6c220cf29caff0936c82e0c086f","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:39c122c726d1bf520dd481350fee5ad940762d5d4c9f8c012db6bf56b0ca8757","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:0bccc03fd9ffe278e15c8f4be1db030307e4cd5020b78d711fc62f104fd6a980","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:0bccc03fd9ffe278e15c8f4be1db030307e4cd5020b78d711fc62f104fd6a980","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:96ae39329a45e017d3444b3794dc95126641ca54fe645bb8729b3d501bd47c64","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9174864cd47431966d033d283bc7836e7ca579139ef85c36275db542fda80803","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011446215156762311033733 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-77d68bd5f8-w9hmb2026-03-19T11:55:17.264482027Z E0319 11:55:17.264423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:17.264571530Z E0319 11:55:17.264546 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:17.264765436Z E0319 11:55:17.264738 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:17.264886570Z E0319 11:55:17.264862 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:17.267873004Z E0319 11:55:17.267846 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:22.960741785Z E0319 11:55:22.959957 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:22.960741785Z E0319 11:55:22.960277 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:22.960741785Z E0319 11:55:22.960435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:22.960741785Z E0319 11:55:22.960584 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:22.960813708Z E0319 11:55:22.960753 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:22.993678067Z E0319 11:55:22.993322 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:22.996990210Z E0319 11:55:22.996944 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:27.080309830Z W0319 11:55:27.080221 1 logging.go:55] [core] [Channel #5 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.119.43:50051: connect: connection refused" 2026-03-19T11:55:28.181356055Z W0319 11:55:28.181239 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.62.185:50051: connect: connection refused" 2026-03-19T11:55:29.150849540Z W0319 11:55:29.150765 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.27.17:50051: connect: connection refused" 2026-03-19T11:55:31.990331003Z W0319 11:55:31.990262 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.9.244:50051: connect: connection refused" 2026-03-19T11:55:47.274193124Z E0319 11:55:47.273857 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:47.274193124Z E0319 11:55:47.273967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:47.274193124Z E0319 11:55:47.274027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:47.274193124Z E0319 11:55:47.274114 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:47.274445082Z E0319 11:55:47.274429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:50.923766271Z W0319 11:55:50.923710 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.62.185:50051: connect: connection refused" 2026-03-19T11:55:52.294563655Z W0319 11:55:52.294483 1 logging.go:55] [core] [Channel #5 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.119.43:50051: connect: connection refused" 2026-03-19T11:55:52.961327837Z E0319 11:55:52.959653 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.961327837Z E0319 11:55:52.959761 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.961327837Z E0319 11:55:52.959956 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.961327837Z E0319 11:55:52.959447 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.961327837Z E0319 11:55:52.960194 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:55.265135841Z W0319 11:55:55.265066 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.9.244:50051: connect: connection refused" 2026-03-19T11:55:57.768686733Z W0319 11:55:57.768585 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.27.17:50051: connect: connection refused" 2026-03-19T11:56:17.281073396Z E0319 11:56:17.280916 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:17.281073396Z E0319 11:56:17.280947 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:17.281073396Z E0319 11:56:17.280950 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:17.281594343Z E0319 11:56:17.281547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:17.284516545Z E0319 11:56:17.284477 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.957852222Z E0319 11:56:22.956672 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.957852222Z E0319 11:56:22.956851 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.957852222Z E0319 11:56:22.957003 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.957852222Z E0319 11:56:22.957021 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.957852222Z E0319 11:56:22.957142 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.963890093Z E0319 11:56:22.961702 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.970712928Z E0319 11:56:22.970514 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:23.007658445Z E0319 11:56:23.007581 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:23.011851637Z E0319 11:56:23.011752 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:34.792945203Z W0319 11:56:34.792870 1 logging.go:55] [core] [Channel #5 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.119.43:50051: connect: connection refused" 2026-03-19T11:56:35.493091851Z W0319 11:56:35.492998 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.9.244:50051: connect: connection refused" 2026-03-19T11:56:37.892525504Z W0319 11:56:37.892431 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.27.17:50051: connect: connection refused" 2026-03-19T11:56:37.965834209Z W0319 11:56:37.965731 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.62.185:50051: connect: connection refused" 2026-03-19T11:56:47.292040291Z E0319 11:56:47.291956 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:47.292432543Z E0319 11:56:47.292401 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:47.292701091Z E0319 11:56:47.292673 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:47.293002291Z E0319 11:56:47.292963 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:47.293528568Z E0319 11:56:47.293453 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.956772658Z E0319 11:56:52.954945 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.956772658Z E0319 11:56:52.955350 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.958334418Z E0319 11:56:52.958299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.959999440Z E0319 11:56:52.958780 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.960867528Z E0319 11:56:52.960831 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:55.359384113Z time="2026-03-19T11:56:55Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-19T11:56:55.359384113Z time="2026-03-19T11:56:55Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-19T11:56:55.359435754Z time="2026-03-19T11:56:55Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.27.17:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-19T11:56:55.359539268Z time="2026-03-19T11:56:55Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.9.244:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-19T11:56:56.155470120Z time="2026-03-19T11:56:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-19T11:56:56.155552363Z time="2026-03-19T11:56:56Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.62.185:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-19T11:57:17.299981070Z E0319 11:57:17.299921 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:17.300112145Z E0319 11:57:17.300077 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:17.300192977Z E0319 11:57:17.300157 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:17.300304501Z E0319 11:57:17.300076 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:17.300424384Z E0319 11:57:17.300084 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.977852943Z E0319 11:57:22.975272 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.977852943Z E0319 11:57:22.975605 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.977852943Z E0319 11:57:22.975769 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.977852943Z E0319 11:57:22.975976 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.977852943Z E0319 11:57:22.976116 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.988875141Z E0319 11:57:22.987866 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.993647221Z E0319 11:57:22.993153 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:31.246616874Z W0319 11:57:31.246515 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.9.244:50051: connect: connection refused" 2026-03-19T11:57:47.309394147Z E0319 11:57:47.308079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:47.309394147Z E0319 11:57:47.308113 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:47.309394147Z E0319 11:57:47.308191 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:47.309394147Z E0319 11:57:47.308079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:47.309394147Z E0319 11:57:47.309022 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:49.174755217Z time="2026-03-19T11:57:49Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-19T11:57:49.174846999Z time="2026-03-19T11:57:49Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.9.244:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-19T11:57:49.531641006Z time="2026-03-19T11:57:49Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-19T11:57:50.077505832Z time="2026-03-19T11:57:50Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-19T11:57:50.077581614Z time="2026-03-19T11:57:50Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.62.185:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-19T11:57:51.470061232Z time="2026-03-19T11:57:51Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-19T11:57:52.070921425Z time="2026-03-19T11:57:52Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-19T11:57:52.071309378Z time="2026-03-19T11:57:52Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.9.244:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-19T11:57:52.964998816Z E0319 11:57:52.964640 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964998816Z E0319 11:57:52.964782 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964998816Z E0319 11:57:52.964834 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964998816Z E0319 11:57:52.964908 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964998816Z E0319 11:57:52.964957 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:54.873563141Z time="2026-03-19T11:57:54Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-19T11:57:54.873563141Z time="2026-03-19T11:57:54Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.9.244:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-19T11:57:56.679669570Z time="2026-03-19T11:57:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-19T11:57:56.870510365Z time="2026-03-19T11:57:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-19T11:57:56.870555996Z time="2026-03-19T11:57:56Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.9.244:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" package-server-manager_current.log0000640000000000000000000002734215156762311036662 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-6j2nj2026-03-19T11:54:42.302082096Z 2026-03-19T11:54:42Z INFO setup starting manager 2026-03-19T11:54:42.309309902Z 2026-03-19T11:54:42Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-19T11:54:42.309309902Z 2026-03-19T11:54:42Z INFO controller-runtime.metrics Starting metrics server 2026-03-19T11:54:42.309309902Z I0319 11:54:42.308964 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-19T11:54:42.309309902Z 2026-03-19T11:54:42Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-19T11:54:42.309309902Z 2026-03-19T11:54:42Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-19T11:54:42.356478279Z I0319 11:54:42.356409 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-19T11:54:42.361313931Z 2026-03-19T11:54:42Z DEBUG events package-server-manager-7b95f86987-6j2nj_3a01edb0-bd15-41fa-ae72-b5359ec96ed3 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"a1992a6a-67a2-4e2a-a275-2b04b11dee5a","apiVersion":"coordination.k8s.io/v1","resourceVersion":"7614"}, "reason": "LeaderElection"} 2026-03-19T11:54:42.365410849Z 2026-03-19T11:54:42Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-19T11:54:42.365410849Z 2026-03-19T11:54:42Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-19T11:54:42.365410849Z 2026-03-19T11:54:42Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-19T11:54:42.566447865Z 2026-03-19T11:54:42Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-19T11:54:42.582069415Z 2026-03-19T11:54:42Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-19T11:54:42.584812351Z 2026-03-19T11:54:42Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:42.584812351Z 2026-03-19T11:54:42Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:42.894243772Z 2026-03-19T11:54:42Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:42.894273253Z 2026-03-19T11:54:42Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:42.917569803Z 2026-03-19T11:54:42Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-19T11:54:42.922131655Z 2026-03-19T11:54:42Z INFO controllers.packageserver updating csv spec 2026-03-19T11:54:42.941206492Z 2026-03-19T11:54:42Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-19T11:54:42.941206492Z 2026-03-19T11:54:42Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:42.941725949Z 2026-03-19T11:54:42Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:42.941725949Z 2026-03-19T11:54:42Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:42.951152724Z 2026-03-19T11:54:42Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:42.952038043Z 2026-03-19T11:54:42Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:43.008941914Z 2026-03-19T11:54:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:43.008941914Z 2026-03-19T11:54:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:43.008941914Z 2026-03-19T11:54:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:43.008941914Z 2026-03-19T11:54:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:43.008941914Z 2026-03-19T11:54:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:43.013188458Z 2026-03-19T11:54:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:43.069838561Z 2026-03-19T11:54:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:43.069838561Z 2026-03-19T11:54:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:43.069838561Z 2026-03-19T11:54:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:43.069838561Z 2026-03-19T11:54:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:43.069887193Z 2026-03-19T11:54:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:43.069887193Z 2026-03-19T11:54:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:43.150625512Z 2026-03-19T11:54:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:43.150625512Z 2026-03-19T11:54:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:43.923988923Z 2026-03-19T11:54:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:43.924032915Z 2026-03-19T11:54:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:43.924106977Z 2026-03-19T11:54:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:43.924149519Z 2026-03-19T11:54:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:43.965837204Z 2026-03-19T11:54:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:43.965837204Z 2026-03-19T11:54:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:44.325877661Z 2026-03-19T11:54:44Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:44.325877661Z 2026-03-19T11:54:44Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:44.325877661Z 2026-03-19T11:54:44Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:44.325877661Z 2026-03-19T11:54:44Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:44.408159568Z 2026-03-19T11:54:44Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:44.408159568Z 2026-03-19T11:54:44Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:44.460998273Z 2026-03-19T11:54:44Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-19T11:54:44.460998273Z 2026-03-19T11:54:44Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:44.460998273Z 2026-03-19T11:54:44Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:54:44.460998273Z 2026-03-19T11:54:44Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-19T11:54:44.514860140Z 2026-03-19T11:54:44Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-19T11:54:44.514860140Z 2026-03-19T11:54:44Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-19T11:56:16.396651500Z E0319 11:56:16.396497 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path kube-rbac-proxy_current.log0000640000000000000000000000160415156762311035356 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-6j2nj2026-03-19T11:54:25.026701879Z W0319 11:54:25.026358 1 deprecated.go:66] 2026-03-19T11:54:25.026701879Z ==== Removed Flag Warning ====================== 2026-03-19T11:54:25.026701879Z 2026-03-19T11:54:25.026701879Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-19T11:54:25.026701879Z 2026-03-19T11:54:25.026701879Z =============================================== 2026-03-19T11:54:25.026701879Z 2026-03-19T11:54:25.027113122Z I0319 11:54:25.027085 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-19T11:54:25.029852318Z I0319 11:54:25.029774 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-19T11:54:25.030196119Z I0319 11:54:25.030120 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-19T11:54:25.030654553Z I0319 11:54:25.030624 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000006205615156762311033016 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5c9796789-8cldl2026-03-19T11:54:43.028199577Z {"level":"error","ts":"2026-03-19T11:54:43Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"55cf5004-79ea-41ff-85a9-c9b6dd0ba4cb","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-19T11:54:43.118690762Z {"level":"error","ts":"2026-03-19T11:54:43Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"72654c48-5a29-45ab-999f-1e313b1c0a78","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-19T11:54:43.273259453Z {"level":"error","ts":"2026-03-19T11:54:43Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"ba08bf28-3145-4cbf-b3f9-273ae022dd62","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-19T11:54:43.594356790Z {"level":"error","ts":"2026-03-19T11:54:43Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"9ac635ae-01fd-4b6d-85c5-bb4e28956aba","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-19T11:54:43.871212181Z time="2026-03-19T11:54:43Z" level=info msg="scheduling ClusterServiceVersion for install" csv=packageserver id=kqcpF namespace=openshift-operator-lifecycle-manager phase=Pending 2026-03-19T11:54:43.871327224Z I0319 11:54:43.871286 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"4cac6d0a-f841-4e16-86e4-ce1a98ca913a", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"7740", FieldPath:""}): type: 'Normal' reason: 'AllRequirementsMet' all requirements found, attempting install 2026-03-19T11:54:44.161845173Z W0319 11:54:44.160911 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-19T11:54:44.283841415Z I0319 11:54:44.282962 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"4cac6d0a-f841-4e16-86e4-ce1a98ca913a", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"7847", FieldPath:""}): type: 'Normal' reason: 'InstallSucceeded' waiting for install components to report healthy 2026-03-19T11:54:44.409452939Z time="2026-03-19T11:54:44Z" level=info msg="install strategy successful" csv=packageserver id=XB0Z7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:44.410465021Z I0319 11:54:44.409972 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"4cac6d0a-f841-4e16-86e4-ce1a98ca913a", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"7906", FieldPath:""}): type: 'Normal' reason: 'InstallWaiting' apiServices not installed 2026-03-19T11:54:44.508392408Z time="2026-03-19T11:54:44Z" level=info msg="install strategy successful" csv=packageserver id=R1DZt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:44.614461830Z time="2026-03-19T11:54:44Z" level=info msg="install strategy successful" csv=packageserver id=SDJoT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:44.712747988Z time="2026-03-19T11:54:44Z" level=info msg="install strategy successful" csv=packageserver id=eIkLT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:44.726624323Z time="2026-03-19T11:54:44Z" level=info msg="install strategy successful" csv=packageserver id=ZIl7H namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:44.811995056Z time="2026-03-19T11:54:44Z" level=info msg="install strategy successful" csv=packageserver id=0yv46 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:44.915966253Z time="2026-03-19T11:54:44Z" level=info msg="install strategy successful" csv=packageserver id=DaJui namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.017842304Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=2I7NC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.114296074Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=oCWcr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.217334561Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=SEH3E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.313492633Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=07SNt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.414832557Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=GohTE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.515018405Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=zukXn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.614484961Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=kMvy5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.716849296Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=iN9we namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.819957966Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=eetFg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:45.922220459Z time="2026-03-19T11:54:45Z" level=info msg="install strategy successful" csv=packageserver id=urH9L namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.017316037Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=OVPAc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.121339585Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=uieds namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.222915356Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=ldtLx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.324489338Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=cuYAX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.425372568Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=TGdd1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.524036728Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=cEudp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.637693317Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=ddgD3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.729330977Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=Ktr4k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.825972585Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=SCc9Q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:46.928146434Z time="2026-03-19T11:54:46Z" level=info msg="install strategy successful" csv=packageserver id=cH+Ol namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.029194759Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=UFP2w namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.130988618Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=kWgW2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.228478721Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=kWSwO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.334554573Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=5vWBi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.433453941Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=abqd2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.530514181Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=4rw+t namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.630423319Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=qhMGH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.731495795Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=OyHl5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.831391224Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=ULLNb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:47.932773369Z time="2026-03-19T11:54:47Z" level=info msg="install strategy successful" csv=packageserver id=1te/T namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:48.037851081Z time="2026-03-19T11:54:48Z" level=info msg="install strategy successful" csv=packageserver id=O3LHy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:48.152549983Z time="2026-03-19T11:54:48Z" level=info msg="install strategy successful" csv=packageserver id=AdpYK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:48.366870475Z time="2026-03-19T11:54:48Z" level=info msg="install strategy successful" csv=packageserver id=xe6qu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:48.464954507Z time="2026-03-19T11:54:48Z" level=info msg="install strategy successful" csv=packageserver id=zQf7L namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:48.571440092Z time="2026-03-19T11:54:48Z" level=info msg="install strategy successful" csv=packageserver id=/8QSL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:48.665126317Z time="2026-03-19T11:54:48Z" level=info msg="install strategy successful" csv=packageserver id=OU+VK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:48.766867583Z time="2026-03-19T11:54:48Z" level=info msg="install strategy successful" csv=packageserver id=M3ZwI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:48.865980167Z time="2026-03-19T11:54:48Z" level=info msg="install strategy successful" csv=packageserver id=qBHvd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:48.966204566Z time="2026-03-19T11:54:48Z" level=info msg="install strategy successful" csv=packageserver id=OGojV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:49.067533420Z time="2026-03-19T11:54:49Z" level=info msg="install strategy successful" csv=packageserver id=j37W6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:49.513534119Z time="2026-03-19T11:54:49Z" level=info msg="install strategy successful" csv=packageserver id=9Alt/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:49.722374810Z time="2026-03-19T11:54:49Z" level=info msg="install strategy successful" csv=packageserver id=7vxyI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:49.812330187Z time="2026-03-19T11:54:49Z" level=info msg="install strategy successful" csv=packageserver id=ZYuHN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:49.912244916Z time="2026-03-19T11:54:49Z" level=info msg="install strategy successful" csv=packageserver id=p+O8v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.012254359Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=uvlNA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.113361036Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=hqjR/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.214677699Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=8gu4U namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.321832315Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=ODLGo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.414858929Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=QQu8e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.514873071Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=Xhx+Q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.618962921Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=xv0R3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.715557486Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=qXHGs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.817829480Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=FHAIh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:50.918088060Z time="2026-03-19T11:54:50Z" level=info msg="install strategy successful" csv=packageserver id=x8jut namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.020326382Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=oo5gT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.118040733Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=emWHc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.217188457Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=lFnbi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.318061277Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=OFJBq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.440593964Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=tOxTb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.541640659Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=uloIG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.640350671Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=iy24U namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.738590608Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=1tGi3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.838713474Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=4fz9+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:51.938556302Z time="2026-03-19T11:54:51Z" level=info msg="install strategy successful" csv=packageserver id=Mfdoj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.038678317Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=fH/hl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.139313349Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=U/b37 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.152065168Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=lEZEB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.158690576Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=dA+cV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.164521438Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=i4gcC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.170414833Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=svJiu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.179209429Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=7k8Qa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.185337220Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=B5Ie6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.240814508Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=p0WPc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.253938509Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=kl2tL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.263593721Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=PTeiB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.349284815Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=zKtd2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.443854757Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=sFFME namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:52.542631111Z time="2026-03-19T11:54:52Z" level=info msg="install strategy successful" csv=packageserver id=3HorI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:54.609155566Z time="2026-03-19T11:54:54Z" level=info msg="install strategy successful" csv=packageserver id=iOlYR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:54.706188998Z time="2026-03-19T11:54:54Z" level=info msg="install strategy successful" csv=packageserver id=bgkMB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:54.831316370Z time="2026-03-19T11:54:54Z" level=info msg="install strategy successful" csv=packageserver id=d0ilq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:54:55.122906302Z time="2026-03-19T11:54:55Z" level=info msg="install strategy successful" csv=packageserver id=z1xzF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-19T11:55:55.125834783Z time="2026-03-19T11:55:55Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator 2026-03-19T11:55:55.125880335Z time="2026-03-19T11:55:55Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" catalog-operator_current.log0000640000000000000000000005663515156762311034736 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-68f85b4d6c-2trz42026-03-19T11:57:53.460849633Z time="2026-03-19T11:57:53Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.060779566Z time="2026-03-19T11:57:54Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=xEfKA 2026-03-19T11:57:54.060918371Z time="2026-03-19T11:57:54Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-cjgpg current-pod.namespace=openshift-marketplace id=xEfKA 2026-03-19T11:57:54.060918371Z time="2026-03-19T11:57:54Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-cjgpg current-pod.namespace=openshift-marketplace id=xEfKA 2026-03-19T11:57:54.061041445Z time="2026-03-19T11:57:54Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=xEfKA 2026-03-19T11:57:54.061041445Z time="2026-03-19T11:57:54Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=xEfKA 2026-03-19T11:57:54.260645098Z time="2026-03-19T11:57:54Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.260770772Z time="2026-03-19T11:57:54Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.260770772Z time="2026-03-19T11:57:54Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.260815973Z time="2026-03-19T11:57:54Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=H48l1 2026-03-19T11:57:54.260880444Z time="2026-03-19T11:57:54Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.260880444Z time="2026-03-19T11:57:54Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.816871711Z time="2026-03-19T11:57:54Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=community-operators state.State=READY" 2026-03-19T11:57:54.816871711Z time="2026-03-19T11:57:54Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:54.816871711Z time="2026-03-19T11:57:54Z" level=info msg="resolving sources" id=nsh9M namespace=openshift-marketplace 2026-03-19T11:57:54.816932613Z time="2026-03-19T11:57:54Z" level=info msg="checking if subscriptions need update" id=nsh9M namespace=openshift-marketplace 2026-03-19T11:57:54.816991544Z time="2026-03-19T11:57:54Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:54.819930147Z time="2026-03-19T11:57:54Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=nsh9M namespace=openshift-marketplace 2026-03-19T11:57:54.832068170Z time="2026-03-19T11:57:54Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-operators state.State=READY" 2026-03-19T11:57:54.832115471Z time="2026-03-19T11:57:54Z" level=info msg="resolving sources" id=tBl8d namespace=openshift-marketplace 2026-03-19T11:57:54.832115471Z time="2026-03-19T11:57:54Z" level=info msg="checking if subscriptions need update" id=tBl8d namespace=openshift-marketplace 2026-03-19T11:57:54.834066264Z time="2026-03-19T11:57:54Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=tBl8d namespace=openshift-marketplace 2026-03-19T11:57:54.861770768Z time="2026-03-19T11:57:54Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.861914773Z time="2026-03-19T11:57:54Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.861914773Z time="2026-03-19T11:57:54Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.862004256Z time="2026-03-19T11:57:54Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.862004256Z time="2026-03-19T11:57:54Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=H48l1 2026-03-19T11:57:54.873365465Z time="2026-03-19T11:57:54Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:54.873365465Z time="2026-03-19T11:57:54Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:55.461553837Z time="2026-03-19T11:57:55Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:55.461745763Z time="2026-03-19T11:57:55Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s22fd current-pod.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:55.461745763Z time="2026-03-19T11:57:55Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s22fd current-pod.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:55.461767594Z time="2026-03-19T11:57:55Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=KxQMn 2026-03-19T11:57:55.461767594Z time="2026-03-19T11:57:55Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:55.461784074Z time="2026-03-19T11:57:55Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:55.663242336Z time="2026-03-19T11:57:55Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:55.663421751Z time="2026-03-19T11:57:55Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:55.663421751Z time="2026-03-19T11:57:55Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:55.663421751Z time="2026-03-19T11:57:55Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=0dM1d 2026-03-19T11:57:55.663421751Z time="2026-03-19T11:57:55Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:55.663421751Z time="2026-03-19T11:57:55Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:56.663034424Z time="2026-03-19T11:57:56Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:56.663203219Z time="2026-03-19T11:57:56Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s22fd current-pod.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:56.663215030Z time="2026-03-19T11:57:56Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s22fd current-pod.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:56.663363194Z time="2026-03-19T11:57:56Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:56.663363194Z time="2026-03-19T11:57:56Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=KxQMn 2026-03-19T11:57:56.678939307Z time="2026-03-19T11:57:56Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:56.678939307Z time="2026-03-19T11:57:56Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:56.860442968Z time="2026-03-19T11:57:56Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:56.860586622Z time="2026-03-19T11:57:56Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:56.860586622Z time="2026-03-19T11:57:56Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:56.860703836Z time="2026-03-19T11:57:56Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:56.860703836Z time="2026-03-19T11:57:56Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=0dM1d 2026-03-19T11:57:56.872031284Z time="2026-03-19T11:57:56Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:56.872031284Z time="2026-03-19T11:57:56Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:57.459669079Z time="2026-03-19T11:57:57Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:57.459810583Z time="2026-03-19T11:57:57Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s22fd current-pod.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:57.459841204Z time="2026-03-19T11:57:57Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s22fd current-pod.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:57.459850744Z time="2026-03-19T11:57:57Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=XWD2T 2026-03-19T11:57:57.459857945Z time="2026-03-19T11:57:57Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:57.459866715Z time="2026-03-19T11:57:57Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:57.661087299Z time="2026-03-19T11:57:57Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:57.661131970Z time="2026-03-19T11:57:57Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:57.661141680Z time="2026-03-19T11:57:57Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:57.661176501Z time="2026-03-19T11:57:57Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=P3gms 2026-03-19T11:57:57.661176501Z time="2026-03-19T11:57:57Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:57.661185802Z time="2026-03-19T11:57:57Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:58.661719055Z time="2026-03-19T11:57:58Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:58.661913290Z time="2026-03-19T11:57:58Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s22fd current-pod.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:58.661913290Z time="2026-03-19T11:57:58Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-s22fd current-pod.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:58.662039984Z time="2026-03-19T11:57:58Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:58.662039984Z time="2026-03-19T11:57:58Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=XWD2T 2026-03-19T11:57:58.861139911Z time="2026-03-19T11:57:58Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:58.861312596Z time="2026-03-19T11:57:58Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:58.861312596Z time="2026-03-19T11:57:58Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:58.861442940Z time="2026-03-19T11:57:58Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:58.861442940Z time="2026-03-19T11:57:58Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P3gms 2026-03-19T11:57:58.867369378Z time="2026-03-19T11:57:58Z" level=error msg="UpdateStatus - error while setting CatalogSource status" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace error="Operation cannot be fulfilled on catalogsources.operators.coreos.com \"redhat-operators\": the object has been modified; please apply your changes to the latest version and try again" id=P3gms 2026-03-19T11:57:58.867435600Z E0319 11:57:58.867401 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-marketplace/redhat-operators\" failed: Operation cannot be fulfilled on catalogsources.operators.coreos.com \"redhat-operators\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-03-19T11:57:58.868609307Z time="2026-03-19T11:57:58Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:58.868627378Z time="2026-03-19T11:57:58Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.264441855Z time="2026-03-19T11:57:59Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.264710184Z time="2026-03-19T11:57:59Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.264710184Z time="2026-03-19T11:57:59Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.264749005Z time="2026-03-19T11:57:59Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=P/glM 2026-03-19T11:57:59.264749005Z time="2026-03-19T11:57:59Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.264762415Z time="2026-03-19T11:57:59Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.861114866Z time="2026-03-19T11:57:59Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.861250240Z time="2026-03-19T11:57:59Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.861250240Z time="2026-03-19T11:57:59Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.861371064Z time="2026-03-19T11:57:59Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.861371064Z time="2026-03-19T11:57:59Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=P/glM 2026-03-19T11:57:59.861457447Z time="2026-03-19T11:57:59Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=IVVqX 2026-03-19T11:57:59.861457447Z time="2026-03-19T11:57:59Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=IVVqX 2026-03-19T11:58:00.262036935Z time="2026-03-19T11:58:00Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=IVVqX 2026-03-19T11:58:00.262197560Z time="2026-03-19T11:58:00Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=IVVqX 2026-03-19T11:58:00.262197560Z time="2026-03-19T11:58:00Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-fbd5s current-pod.namespace=openshift-marketplace id=IVVqX 2026-03-19T11:58:00.262245812Z time="2026-03-19T11:58:00Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=IVVqX 2026-03-19T11:58:00.262278383Z time="2026-03-19T11:58:00Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=IVVqX 2026-03-19T11:58:00.262278383Z time="2026-03-19T11:58:00Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=IVVqX config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_current.log0000640000000000000000000001055315156762311031310 0ustar00000000000000002026-03-19T11:56:48.361896852Z I0319 11:56:48.359929 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:56:48.361896852Z I0319 11:56:48.360059 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:56:48.361896852Z I0319 11:56:48.361470 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-19T11:56:48.361896852Z I0319 11:56:48.361812 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:48.362107469Z I0319 11:56:48.362077 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:48.419375187Z I0319 11:56:48.418924 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-19T11:56:59.834471386Z I0319 11:56:59.834219 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:56:59.834471386Z W0319 11:56:59.834255 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.834471386Z W0319 11:56:59.834260 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.834471386Z W0319 11:56:59.834264 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:56:59.834471386Z W0319 11:56:59.834268 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:56:59.834471386Z W0319 11:56:59.834271 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:56:59.834471386Z W0319 11:56:59.834274 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:56:59.839501736Z I0319 11:56:59.839305 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:56:59.839693432Z I0319 11:56:59.839657 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:56:59.839729263Z I0319 11:56:59.839714 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:56:59.839762414Z I0319 11:56:59.839748 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:56:59.839815306Z I0319 11:56:59.839774 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-19T11:56:59.839815306Z I0319 11:56:59.839781 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:56:59.839935659Z I0319 11:56:59.839911 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:56:59.840031922Z I0319 11:56:59.840016 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:56:59.840031922Z I0319 11:56:59.840024 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:59.840058762Z I0319 11:56:59.840044 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:56:59.840058762Z I0319 11:56:59.840050 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.941843427Z I0319 11:56:59.940869 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.941843427Z I0319 11:56:59.940891 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:56:59.941843427Z I0319 11:56:59.940940 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-sc4kz/etcd-operator_previous.log0000640000000000000000000003732415156762311031507 0ustar00000000000000002026-03-19T11:55:14.420775523Z I0319 11:55:14.420754 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-19T11:55:14.420849605Z I0319 11:55:14.420774 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-19T11:55:14.420849605Z I0319 11:55:14.420785 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-19T11:55:14.420849605Z I0319 11:55:14.420785 1 base_controller.go:181] Shutting down EtcdMembersController ... 2026-03-19T11:55:14.420849605Z I0319 11:55:14.420834 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-03-19T11:55:14.420890277Z I0319 11:55:14.420823 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-19T11:55:14.420890277Z I0319 11:55:14.420851 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-03-19T11:55:14.420890277Z I0319 11:55:14.420863 1 controller_manager.go:54] etcd-Node controller terminated 2026-03-19T11:55:14.420890277Z I0319 11:55:14.420869 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-19T11:55:14.420890277Z I0319 11:55:14.420884 1 controller_manager.go:54] GuardController controller terminated 2026-03-19T11:55:14.420934828Z I0319 11:55:14.420886 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1195928684/tls.crt::/tmp/serving-cert-1195928684/tls.key" 2026-03-19T11:55:14.421023061Z I0319 11:55:14.420956 1 base_controller.go:181] Shutting down EtcdCertCleanerController ... 2026-03-19T11:55:14.421023061Z I0319 11:55:14.420994 1 base_controller.go:181] Shutting down FSyncController ... 2026-03-19T11:55:14.421023061Z I0319 11:55:14.421002 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:55:14.421049872Z I0319 11:55:14.421029 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:55:14.421070992Z I0319 11:55:14.421052 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:55:14.421097013Z I0319 11:55:14.421080 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-03-19T11:55:14.421118204Z I0319 11:55:14.421098 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-03-19T11:55:14.421118204Z I0319 11:55:14.421114 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-19T11:55:14.421140205Z I0319 11:55:14.421126 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-19T11:55:14.421140205Z I0319 11:55:14.421133 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-19T11:55:14.421161885Z I0319 11:55:14.421146 1 base_controller.go:123] Shutting down worker of MachineDeletionHooksController controller ... 2026-03-19T11:55:14.421161885Z I0319 11:55:14.421157 1 base_controller.go:113] All MachineDeletionHooksController workers have been terminated 2026-03-19T11:55:14.421350231Z I0319 11:55:14.421275 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-19T11:55:14.421376872Z I0319 11:55:14.421355 1 base_controller.go:181] Shutting down PruneController ... 2026-03-19T11:55:14.421397183Z I0319 11:55:14.421379 1 base_controller.go:181] Shutting down etcd-operator-UnsupportedConfigOverrides ... 2026-03-19T11:55:14.421417433Z I0319 11:55:14.421396 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-19T11:55:14.421417433Z I0319 11:55:14.421408 1 base_controller.go:181] Shutting down etcd-UnsupportedConfigOverrides ... 2026-03-19T11:55:14.421438464Z I0319 11:55:14.421421 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-19T11:55:14.421438464Z I0319 11:55:14.421429 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-19T11:55:14.421438464Z I0319 11:55:14.421434 1 controller_manager.go:54] PruneController controller terminated 2026-03-19T11:55:14.421461515Z I0319 11:55:14.421443 1 base_controller.go:123] Shutting down worker of etcd-operator-UnsupportedConfigOverrides controller ... 2026-03-19T11:55:14.421461515Z I0319 11:55:14.421452 1 base_controller.go:113] All etcd-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:55:14.421461515Z I0319 11:55:14.421457 1 controller_manager.go:54] etcd-operator-UnsupportedConfigOverrides controller terminated 2026-03-19T11:55:14.421493976Z I0319 11:55:14.421466 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-19T11:55:14.421493976Z I0319 11:55:14.421475 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-19T11:55:14.421493976Z I0319 11:55:14.421480 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-19T11:55:14.421493976Z I0319 11:55:14.421489 1 base_controller.go:123] Shutting down worker of etcd-UnsupportedConfigOverrides controller ... 2026-03-19T11:55:14.421517387Z I0319 11:55:14.421497 1 base_controller.go:113] All etcd-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:55:14.421517387Z I0319 11:55:14.421506 1 base_controller.go:123] Shutting down worker of StatusSyncer_etcd controller ... 2026-03-19T11:55:14.421538337Z I0319 11:55:14.421514 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-19T11:55:14.422174856Z E0319 11:55:14.422099 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/backups-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/etcd-backup-sa\": context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:14.422174856Z I0319 11:55:14.422143 1 base_controller.go:181] Shutting down etcd-StaticPodState ... 2026-03-19T11:55:14.422174856Z I0319 11:55:14.422164 1 base_controller.go:181] Shutting down etcd-InstallerState ... 2026-03-19T11:55:14.422213358Z I0319 11:55:14.422190 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:55:14.422213358Z I0319 11:55:14.422205 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:55:14.422235278Z I0319 11:55:14.422213 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-19T11:55:14.422356532Z I0319 11:55:14.422293 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-03-19T11:55:14.422356532Z I0319 11:55:14.422329 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-19T11:55:14.422356532Z I0319 11:55:14.422341 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-19T11:55:14.422381073Z I0319 11:55:14.422360 1 base_controller.go:123] Shutting down worker of FSyncController controller ... 2026-03-19T11:55:14.422402114Z I0319 11:55:14.422380 1 base_controller.go:113] All FSyncController workers have been terminated 2026-03-19T11:55:14.422517637Z I0319 11:55:14.422462 1 base_controller.go:123] Shutting down worker of EtcdCertCleanerController controller ... 2026-03-19T11:55:14.422517637Z I0319 11:55:14.422484 1 base_controller.go:113] All EtcdCertCleanerController workers have been terminated 2026-03-19T11:55:14.422517637Z I0319 11:55:14.422504 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-03-19T11:55:14.422542698Z I0319 11:55:14.422517 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-03-19T11:55:14.422542698Z I0319 11:55:14.422535 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:55:14.422573649Z I0319 11:55:14.422548 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:55:14.422573649Z I0319 11:55:14.422557 1 controller_manager.go:54] RevisionController controller terminated 2026-03-19T11:55:14.422595700Z I0319 11:55:14.422572 1 base_controller.go:123] Shutting down worker of DefragController controller ... 2026-03-19T11:55:14.422595700Z I0319 11:55:14.422586 1 base_controller.go:113] All DefragController workers have been terminated 2026-03-19T11:55:14.422669072Z I0319 11:55:14.420443 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-19T11:55:14.422669072Z I0319 11:55:14.422644 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-19T11:55:14.422669072Z I0319 11:55:14.422662 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-03-19T11:55:14.422692613Z I0319 11:55:14.422676 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-03-19T11:55:14.422713863Z I0319 11:55:14.422693 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-19T11:55:14.422713863Z I0319 11:55:14.422706 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-19T11:55:14.422787356Z I0319 11:55:14.422748 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-03-19T11:55:14.422787356Z I0319 11:55:14.422769 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-03-19T11:55:14.422787356Z I0319 11:55:14.422775 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-03-19T11:55:14.423508709Z W0319 11:55:14.423098 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:55:14.423508709Z W0319 11:55:14.423120 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:55:14.423508709Z W0319 11:55:14.423128 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-19T11:55:14.423508709Z E0319 11:55:14.423280 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:14.423508709Z I0319 11:55:14.423312 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"da829268-318b-4b36-a672-3d47494f848a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 1 count 0 on node "master-0": Get "https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/pods/installer-1-master-0": context canceled 2026-03-19T11:55:14.423546560Z I0319 11:55:14.423514 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-19T11:55:14.423640753Z I0319 11:55:14.423597 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-19T11:55:14.424868362Z I0319 11:55:14.424734 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-19T11:55:14.424868362Z I0319 11:55:14.424766 1 base_controller.go:113] All Installer workers have been terminated 2026-03-19T11:55:14.424868362Z I0319 11:55:14.424778 1 controller_manager.go:54] Installer controller terminated 2026-03-19T11:55:14.800119423Z I0319 11:55:14.800050 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:55:19.044401154Z I0319 11:55:19.044321 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="9dd3c9528ee0bb6beb9fad17aca41f2f6aead3f6c75e51be52e8b2c5e8e5adcf") 2026-03-19T11:55:19.044401154Z I0319 11:55:19.044356 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-03-19T11:55:19.044438745Z I0319 11:55:19.044401 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="6d02d8db3345e23f75a746087e4d36398db0e389f6ef603017141e949409a2a7") 2026-03-19T11:55:19.044438745Z I0319 11:55:19.044408 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-03-19T11:55:19.044469316Z I0319 11:55:19.044451 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="6bfc30781687944a974e3bf31384f4230d83ddd12790bc4a8e83f3f17b294027") 2026-03-19T11:55:19.044469316Z I0319 11:55:19.044463 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-03-19T11:55:19.044536218Z I0319 11:55:19.044504 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="f7c24c48fc0f935e88ab8a5013f3644ab8ad9e74a824f21910477b34980d521a") 2026-03-19T11:55:19.044536218Z I0319 11:55:19.044516 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-03-19T11:55:19.044600920Z I0319 11:55:19.044565 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="ee628508e2e18090fba4f650a8b1c51ac0a13e82261d883bda66d40ceeaf9bf5") 2026-03-19T11:55:19.044600920Z I0319 11:55:19.044577 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-03-19T11:55:19.044641532Z I0319 11:55:19.044620 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="9276cd93a7d32d3b2c91436d440186564088d3b41d04b2eb343577747268f0e9") 2026-03-19T11:55:19.044641532Z I0319 11:55:19.044631 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-03-19T11:55:19.419491412Z I0319 11:55:19.419394 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:55:29.801364084Z W0319 11:55:29.801305 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:55:29.801679504Z E0319 11:55:29.801640 1 base_controller.go:279] "Unhandled Error" err="EtcdMembersController reconciliation failed: giving up getting a cached client after 3 tries" 2026-03-19T11:55:29.802864312Z I0319 11:55:29.802815 1 base_controller.go:123] Shutting down worker of EtcdMembersController controller ... 2026-03-19T11:55:29.802864312Z I0319 11:55:29.802848 1 base_controller.go:113] All EtcdMembersController workers have been terminated 2026-03-19T11:55:48.423974558Z E0319 11:55:48.423551 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:48.423974558Z W0319 11:55:48.423592 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-sc4kz.json0000640000000000000000000001576315156762311024232 0ustar0000000000000000{"metadata":{"name":"etcd-operator-8544cbcf9c-sc4kz","generateName":"etcd-operator-8544cbcf9c-","namespace":"openshift-etcd-operator","uid":"9702fc8c-4fe0-413b-b2d4-db23021d42b8","resourceVersion":"9567","creationTimestamp":"2026-03-19T11:51:45Z","labels":{"app":"etcd-operator","pod-template-hash":"8544cbcf9c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-8544cbcf9c","uid":"5ed5df0a-efe8-48b2-8901-5b2fb910c1ca","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-tpdts","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-tpdts","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:49Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-03-19T11:53:37Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:48Z","finishedAt":"2026-03-19T11:55:48Z","containerID":"cri-o://6c3d43a01987e52cadf8e3819b9c184c46b6535cb510d14c96117eed3c48a981"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","containerID":"cri-o://85e7981ab4ffb136104e696dbd4ddd983e1e59fded9b6089f718fe30c9ce6d06","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-tpdts","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002746115156762311034004 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-897cc986b-vpg2l2026-03-19T11:54:43.884914020Z W0319 11:54:43.883119 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-19T11:54:43.884914020Z I0319 11:54:43.883479 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773921283 cert, and key in /tmp/serving-cert-3090658376/serving-signer.crt, /tmp/serving-cert-3090658376/serving-signer.key 2026-03-19T11:54:44.478355366Z I0319 11:54:44.478215 1 observer_polling.go:159] Starting file observer 2026-03-19T11:54:44.507957724Z I0319 11:54:44.507888 1 builder.go:304] check-endpoints version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-19T11:54:44.510948758Z I0319 11:54:44.509400 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3090658376/tls.crt::/tmp/serving-cert-3090658376/tls.key" 2026-03-19T11:54:45.215425562Z I0319 11:54:45.215347 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-19T11:54:45.217726094Z I0319 11:54:45.217669 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-19T11:54:45.217726094Z I0319 11:54:45.217695 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-19T11:54:45.217748574Z I0319 11:54:45.217725 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-19T11:54:45.217748574Z I0319 11:54:45.217734 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-19T11:54:45.226447377Z I0319 11:54:45.226379 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:54:45.226447377Z W0319 11:54:45.226410 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:54:45.226447377Z W0319 11:54:45.226415 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:54:45.226447377Z W0319 11:54:45.226419 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:54:45.226447377Z W0319 11:54:45.226422 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:54:45.226447377Z W0319 11:54:45.226425 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:54:45.226447377Z W0319 11:54:45.226427 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:54:45.227303264Z I0319 11:54:45.226729 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-19T11:54:45.233698214Z I0319 11:54:45.233651 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3090658376/tls.crt::/tmp/serving-cert-3090658376/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773921283\" (2026-03-19 11:54:43 +0000 UTC to 2026-04-18 11:54:44 +0000 UTC (now=2026-03-19 11:54:45.233614222 +0000 UTC))" 2026-03-19T11:54:45.233817047Z I0319 11:54:45.233779 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921285\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921284\" (2026-03-19 10:54:44 +0000 UTC to 2027-03-19 10:54:44 +0000 UTC (now=2026-03-19 11:54:45.233762827 +0000 UTC))" 2026-03-19T11:54:45.233817047Z I0319 11:54:45.233812 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-19T11:54:45.233858049Z I0319 11:54:45.233831 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-19T11:54:45.233858049Z I0319 11:54:45.233780 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:54:45.233858049Z I0319 11:54:45.233844 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:54:45.233889530Z I0319 11:54:45.233875 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:54:45.234932513Z I0319 11:54:45.233881 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:54:45.234932513Z I0319 11:54:45.234018 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:54:45.234932513Z I0319 11:54:45.233915 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3090658376/tls.crt::/tmp/serving-cert-3090658376/tls.key" 2026-03-19T11:54:45.234932513Z I0319 11:54:45.234037 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:54:45.234932513Z I0319 11:54:45.233917 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:54:45.234932513Z I0319 11:54:45.234049 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:54:45.234932513Z I0319 11:54:45.234065 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:54:45.239355812Z I0319 11:54:45.236038 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:54:45.239355812Z I0319 11:54:45.236487 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:54:45.239355812Z I0319 11:54:45.237332 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:54:45.239430693Z I0319 11:54:45.239414 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-19T11:54:45.334105869Z I0319 11:54:45.333994 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:54:45.334142210Z I0319 11:54:45.334045 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:54:45.334142210Z I0319 11:54:45.334129 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:54:45.334310096Z I0319 11:54:45.334289 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-19 11:43:19 +0000 UTC to 2026-03-20 11:43:19 +0000 UTC (now=2026-03-19 11:54:45.334262264 +0000 UTC))" 2026-03-19T11:54:45.334508782Z I0319 11:54:45.334449 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3090658376/tls.crt::/tmp/serving-cert-3090658376/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773921283\" (2026-03-19 11:54:43 +0000 UTC to 2026-04-18 11:54:44 +0000 UTC (now=2026-03-19 11:54:45.33443523 +0000 UTC))" 2026-03-19T11:54:45.334562494Z I0319 11:54:45.334546 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921285\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921284\" (2026-03-19 10:54:44 +0000 UTC to 2027-03-19 10:54:44 +0000 UTC (now=2026-03-19 11:54:45.334535073 +0000 UTC))" 2026-03-19T11:54:45.334680186Z I0319 11:54:45.334663 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:36:28 +0000 UTC to 2036-03-16 11:36:28 +0000 UTC (now=2026-03-19 11:54:45.334651555 +0000 UTC))" 2026-03-19T11:54:45.334688187Z I0319 11:54:45.334682 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:21 +0000 UTC to 2026-03-20 11:43:21 +0000 UTC (now=2026-03-19 11:54:45.334674256 +0000 UTC))" 2026-03-19T11:54:45.334759589Z I0319 11:54:45.334696 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-19 11:43:21 +0000 UTC to 2027-03-19 11:43:21 +0000 UTC (now=2026-03-19 11:54:45.334688127 +0000 UTC))" 2026-03-19T11:54:45.334759589Z I0319 11:54:45.334714 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:21 +0000 UTC to 2027-03-19 11:43:21 +0000 UTC (now=2026-03-19 11:54:45.334705747 +0000 UTC))" 2026-03-19T11:54:45.334759589Z I0319 11:54:45.334726 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:43:19 +0000 UTC to 2036-03-16 11:43:19 +0000 UTC (now=2026-03-19 11:54:45.334719118 +0000 UTC))" 2026-03-19T11:54:45.334759589Z I0319 11:54:45.334739 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-19 11:43:19 +0000 UTC to 2026-03-20 11:43:19 +0000 UTC (now=2026-03-19 11:54:45.334731798 +0000 UTC))" 2026-03-19T11:54:45.334862452Z I0319 11:54:45.334846 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3090658376/tls.crt::/tmp/serving-cert-3090658376/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773921283\" (2026-03-19 11:54:43 +0000 UTC to 2026-04-18 11:54:44 +0000 UTC (now=2026-03-19 11:54:45.334836111 +0000 UTC))" 2026-03-19T11:54:45.334978186Z I0319 11:54:45.334961 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921285\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921284\" (2026-03-19 10:54:44 +0000 UTC to 2027-03-19 10:54:44 +0000 UTC (now=2026-03-19 11:54:45.334937845 +0000 UTC))" 2026-03-19T11:54:45.584733058Z I0319 11:54:45.584654 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:54:45.640357240Z I0319 11:54:45.640171 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-19T11:54:45.640357240Z I0319 11:54:45.640223 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-897cc986b-vpg2l/openshift-apiserver_current.log0000640000000000000000000011714015156762311031001 0ustar00000000000000002026-03-19T11:56:22.993653873Z E0319 11:56:22.993559 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:23.001210351Z E0319 11:56:23.001172 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:23.001325055Z E0319 11:56:23.001297 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:23.460488303Z W0319 11:56:23.460373 1 logging.go:55] [core] [Channel #48 SubChannel #49]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:37.436332730Z E0319 11:56:37.436223 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.436761744Z E0319 11:56:37.436724 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.436862977Z E0319 11:56:37.436824 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.436936809Z E0319 11:56:37.436900 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.436985521Z E0319 11:56:37.436958 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.437013452Z E0319 11:56:37.436965 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.437162627Z E0319 11:56:37.437115 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.437162627Z E0319 11:56:37.437144 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.437273400Z E0319 11:56:37.437115 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.437356753Z E0319 11:56:37.437327 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.448326239Z E0319 11:56:37.448253 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.448661750Z E0319 11:56:37.448616 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.449139904Z E0319 11:56:37.449091 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.449351341Z E0319 11:56:37.449333 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:37.449488705Z E0319 11:56:37.449451 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.967924440Z E0319 11:56:52.967834 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.967924440Z E0319 11:56:52.967843 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.967979712Z E0319 11:56:52.967943 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.967979712Z E0319 11:56:52.967937 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968103806Z E0319 11:56:52.968059 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968201719Z E0319 11:56:52.967837 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968295212Z E0319 11:56:52.968259 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968332584Z E0319 11:56:52.968309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968474728Z E0319 11:56:52.968411 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968474728Z E0319 11:56:52.968445 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968474728Z E0319 11:56:52.968448 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968529040Z E0319 11:56:52.968502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968645774Z E0319 11:56:52.968614 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968712556Z E0319 11:56:52.968679 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.968728776Z E0319 11:56:52.968711 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.452604 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.452892 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.453077 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.453252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.453418 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.453528 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.453585 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.453748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.453929 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.454063020Z E0319 11:57:07.454017 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.499906137Z E0319 11:57:07.499769 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.499906137Z E0319 11:57:07.499830 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.499992820Z E0319 11:57:07.499960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.500059052Z E0319 11:57:07.500027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:07.500212347Z E0319 11:57:07.499774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.956500878Z E0319 11:57:22.956429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.965300206Z E0319 11:57:22.962988 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.965300206Z E0319 11:57:22.963043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.965300206Z E0319 11:57:22.963075 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.965300206Z E0319 11:57:22.963318 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.965300206Z E0319 11:57:22.963043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.965300206Z E0319 11:57:22.964863 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.965349827Z E0319 11:57:22.965310 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.965734440Z E0319 11:57:22.965700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.966124872Z E0319 11:57:22.966091 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.966347629Z E0319 11:57:22.966270 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.966442492Z E0319 11:57:22.966416 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.966637669Z E0319 11:57:22.966610 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.966773443Z E0319 11:57:22.966748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.966905087Z E0319 11:57:22.966883 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.967118524Z E0319 11:57:22.967070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.980588669Z E0319 11:57:22.978445 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.980588669Z E0319 11:57:22.978512 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.984865324Z E0319 11:57:22.983704 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.984865324Z E0319 11:57:22.983706 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.989417808Z E0319 11:57:22.989367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.457279691Z E0319 11:57:37.457191 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.457279691Z E0319 11:57:37.457246 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.458381825Z E0319 11:57:37.457570 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.458381825Z E0319 11:57:37.457656 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.463066824Z E0319 11:57:37.463002 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.463615900Z E0319 11:57:37.463572 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.463895659Z E0319 11:57:37.463856 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.464076785Z E0319 11:57:37.464049 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.464187189Z E0319 11:57:37.464154 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.464260391Z E0319 11:57:37.464154 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.510639876Z E0319 11:57:37.510587 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.510739029Z E0319 11:57:37.510701 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.510739029Z E0319 11:57:37.510727 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.510828922Z E0319 11:57:37.510634 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:37.510932165Z E0319 11:57:37.510719 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.963497639Z E0319 11:57:52.962931 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.963497639Z E0319 11:57:52.963153 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.963497639Z E0319 11:57:52.963309 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.963497639Z E0319 11:57:52.963458 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.963643454Z E0319 11:57:52.963607 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.963677835Z E0319 11:57:52.963658 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.963919382Z E0319 11:57:52.963822 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.963919382Z E0319 11:57:52.963885 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964042926Z E0319 11:57:52.964024 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964181051Z E0319 11:57:52.964157 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964217962Z E0319 11:57:52.964200 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964368147Z E0319 11:57:52.964346 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964440089Z E0319 11:57:52.964420 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.964642086Z E0319 11:57:52.964611 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:52.966980329Z E0319 11:57:52.966946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315156762311040067 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-mjs7x2026-03-19T11:56:48.551853941Z I0319 11:56:48.549263 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:56:48.551853941Z I0319 11:56:48.549412 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:56:48.551853941Z I0319 11:56:48.550216 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:48.595372854Z I0319 11:56:48.595274 1 builder.go:304] openshift-apiserver-operator version - 2026-03-19T11:56:59.814588339Z I0319 11:56:59.812229 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:56:59.814588339Z W0319 11:56:59.812284 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.814588339Z W0319 11:56:59.812293 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.814588339Z W0319 11:56:59.812301 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:56:59.814588339Z W0319 11:56:59.812307 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:56:59.814588339Z W0319 11:56:59.812312 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:56:59.814588339Z W0319 11:56:59.812316 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:56:59.821864158Z I0319 11:56:59.818920 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:56:59.821864158Z I0319 11:56:59.819236 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... 2026-03-19T11:56:59.835459467Z I0319 11:56:59.831423 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:56:59.835459467Z I0319 11:56:59.831479 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:56:59.835459467Z I0319 11:56:59.831501 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:56:59.835459467Z I0319 11:56:59.831544 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:56:59.835459467Z I0319 11:56:59.831642 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:56:59.835459467Z I0319 11:56:59.831728 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:56:59.835459467Z I0319 11:56:59.831733 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:59.835459467Z I0319 11:56:59.831744 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:56:59.835459467Z I0319 11:56:59.831749 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.931976706Z I0319 11:56:59.931864 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.931976706Z I0319 11:56:59.931920 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:56:59.932076569Z I0319 11:56:59.932000 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file openshift-apiserver-operator_previous.log0000640000000000000000000004750115156762311040275 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-mjs7x2026-03-19T11:54:55.057693657Z W0319 11:54:54.873383 1 dynamic_operator_client.go:355] .status.conditions["APIServerDeploymentProgressing"].message is missing; this will eventually be fatal 2026-03-19T11:54:55.057693657Z W0319 11:54:54.873389 1 dynamic_operator_client.go:352] .status.conditions["APIServerWorkloadDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:54:55.057693657Z W0319 11:54:54.873393 1 dynamic_operator_client.go:355] .status.conditions["APIServerWorkloadDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:54:55.057693657Z I0319 11:54:54.874375 1 status_controller.go:225] clusteroperator/openshift-apiserver diff {"status":{"versions":[{"name":"operator","version":"4.18.35"},{"name":"openshift-apiserver","version":"4.18.35"}]}} 2026-03-19T11:54:55.057693657Z I0319 11:54:54.874694 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-apiserver-operator", Name:"openshift-apiserver-operator", UID:"9db96e7e-3a74-4a64-9c61-c0b917400694", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/openshift-apiserver version "openshift-apiserver" changed from "" to "4.18.35" 2026-03-19T11:54:55.088251206Z I0319 11:54:55.086133 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-19T11:54:55.095378769Z I0319 11:54:55.095312 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-19T11:54:55.103847755Z I0319 11:54:55.100705 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-apiserver-operator", Name:"openshift-apiserver-operator", UID:"9db96e7e-3a74-4a64-9c61-c0b917400694", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{"operator" "4.18.35"}] to [{"operator" "4.18.35"} {"openshift-apiserver" "4.18.35"}] 2026-03-19T11:54:55.103847755Z I0319 11:54:55.103047 1 status_controller.go:225] clusteroperator/openshift-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-19T11:54:00Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-19T11:54:55Z","message":"All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-19T11:54:00Z","message":"APIServicesAvailable: PreconditionNotReady","reason":"APIServices_PreconditionNotReady","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-19T11:53:59Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-19T11:53:59Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-19T11:55:13.699176213Z I0319 11:55:13.699088 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="c736c382e05f792a60b754617cee95916e03f0ae4b9b796ac23ed30575815762") 2026-03-19T11:55:13.699176213Z W0319 11:55:13.699139 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-19T11:55:13.699238295Z I0319 11:55:13.699206 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="aa5dde20039014bf755161bcdc3f38401c765bf4664380ef656d705cfc7eeffc") 2026-03-19T11:55:13.699374689Z E0319 11:55:13.699316 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-19T11:55:13.699374689Z I0319 11:55:13.699342 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-03-19T11:55:13.699374689Z I0319 11:55:13.699356 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-19T11:55:13.699374689Z I0319 11:55:13.699367 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-03-19T11:55:13.699405890Z I0319 11:55:13.699378 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-03-19T11:55:13.699405890Z E0319 11:55:13.699393 1 leaderelection.go:436] error retrieving resource lock openshift-apiserver-operator/openshift-apiserver-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-19T11:55:13.699415281Z I0319 11:55:13.699407 1 leaderelection.go:297] failed to renew lease openshift-apiserver-operator/openshift-apiserver-operator-lock: timed out waiting for the condition 2026-03-19T11:55:13.699480703Z I0319 11:55:13.699447 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-03-19T11:55:13.699480703Z I0319 11:55:13.699457 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:55:13.699491733Z I0319 11:55:13.699469 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-03-19T11:55:13.699514324Z I0319 11:55:13.699499 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-03-19T11:55:13.699523744Z I0319 11:55:13.699318 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-19T11:55:13.699557715Z I0319 11:55:13.699521 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-19T11:55:13.699630107Z E0319 11:55:13.699599 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled" 2026-03-19T11:55:13.699708270Z E0319 11:55:13.699665 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Post \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:13.699708270Z I0319 11:55:13.699693 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-19T11:55:13.699742191Z I0319 11:55:13.699724 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-19T11:55:13.699742191Z I0319 11:55:13.699735 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-19T11:55:13.699766532Z I0319 11:55:13.699753 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-19T11:55:13.699815203Z I0319 11:55:13.699772 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-apiserver-operator", Name:"openshift-apiserver-operator", UID:"9db96e7e-3a74-4a64-9c61-c0b917400694", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'CreateFailed' Failed to create /v1.image.openshift.io: Post "https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices": context canceled 2026-03-19T11:55:13.699831364Z I0319 11:55:13.699813 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-19T11:55:13.699869184Z I0319 11:55:13.699847 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:55:13.699890345Z I0319 11:55:13.699871 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:55:13.699978327Z I0319 11:55:13.699914 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:55:13.700023709Z I0319 11:55:13.700005 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-03-19T11:55:13.700035389Z I0319 11:55:13.700029 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-19T11:55:13.700064570Z I0319 11:55:13.700040 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2840545380/tls.crt::/tmp/serving-cert-2840545380/tls.key" 2026-03-19T11:55:13.700117902Z I0319 11:55:13.700099 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-03-19T11:55:13.700117902Z I0319 11:55:13.700097 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-03-19T11:55:13.700128482Z I0319 11:55:13.700119 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:55:13.700154453Z I0319 11:55:13.700135 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-03-19T11:55:13.700154453Z I0319 11:55:13.700147 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-03-19T11:55:13.700164683Z I0319 11:55:13.700145 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-03-19T11:55:13.700164683Z I0319 11:55:13.700154 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:55:13.700173744Z I0319 11:55:13.700161 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-03-19T11:55:13.700181734Z I0319 11:55:13.700170 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:55:13.700216655Z I0319 11:55:13.699540 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-19T11:55:13.700227175Z I0319 11:55:13.700220 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-19T11:55:13.700265987Z I0319 11:55:13.700247 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-19T11:55:13.700276387Z I0319 11:55:13.700265 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-19T11:55:13.700331579Z I0319 11:55:13.700311 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-19T11:55:13.700342219Z I0319 11:55:13.700330 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-19T11:55:13.700389880Z I0319 11:55:13.700370 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:55:13.700389880Z I0319 11:55:13.700383 1 builder.go:335] server exited 2026-03-19T11:55:13.700399911Z I0319 11:55:13.700390 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:55:13.700399911Z I0319 11:55:13.700397 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:55:13.700438732Z I0319 11:55:13.700421 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-03-19T11:55:13.700438732Z I0319 11:55:13.700427 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-19T11:55:13.700448812Z I0319 11:55:13.700437 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-19T11:55:13.700448812Z I0319 11:55:13.700445 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-03-19T11:55:13.700463973Z I0319 11:55:13.700447 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-03-19T11:55:13.700463973Z I0319 11:55:13.700450 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-03-19T11:55:13.700463973Z I0319 11:55:13.700454 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:55:13.700474663Z I0319 11:55:13.700463 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:55:13.700474663Z I0319 11:55:13.700466 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-19T11:55:13.700484623Z I0319 11:55:13.700473 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-19T11:55:13.700484623Z I0319 11:55:13.700476 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-19T11:55:13.700494204Z I0319 11:55:13.700481 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-03-19T11:55:13.700596067Z I0319 11:55:13.700503 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-03-19T11:55:13.700596067Z I0319 11:55:13.700515 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-19T11:55:13.700596067Z I0319 11:55:13.700522 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-03-19T11:55:13.700596067Z I0319 11:55:13.700529 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-03-19T11:55:13.700596067Z I0319 11:55:13.700509 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-03-19T11:55:13.700596067Z I0319 11:55:13.700537 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-03-19T11:55:13.700596067Z I0319 11:55:13.700541 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-03-19T11:55:13.700596067Z I0319 11:55:13.700543 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-03-19T11:55:13.701177945Z I0319 11:55:13.701019 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-19T11:55:13.701177945Z I0319 11:55:13.701036 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-19T11:55:13.701177945Z I0319 11:55:13.701079 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-03-19T11:55:13.701177945Z I0319 11:55:13.701093 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-03-19T11:55:13.701808155Z E0319 11:55:13.701742 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"v3.11.0/openshift-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled, \"v3.11.0/openshift-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:13.702250189Z W0319 11:55:13.702210 1 dynamic_operator_client.go:355] .status.conditions["APIServerDeploymentAvailable"].message is missing; this will eventually be fatal 2026-03-19T11:55:13.702250189Z W0319 11:55:13.702233 1 dynamic_operator_client.go:355] .status.conditions["APIServerDeploymentProgressing"].message is missing; this will eventually be fatal 2026-03-19T11:55:13.702400554Z E0319 11:55:13.702356 1 base_controller.go:279] "Unhandled Error" err="OpenShiftAPIServer-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OpenShiftAPIServer-Workload\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:13.702400554Z E0319 11:55:13.702378 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:13.703460597Z E0319 11:55:13.703404 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_openshift-apiserver reconciliation failed: Put \"https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/openshift-apiserver/status\": context canceled" 2026-03-19T11:55:13.703460597Z I0319 11:55:13.703416 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-19T11:55:13.703460597Z I0319 11:55:13.703439 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-19T11:55:13.703482607Z I0319 11:55:13.703474 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-19T11:55:13.703515408Z I0319 11:55:13.703489 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-19T11:55:13.703515408Z I0319 11:55:13.703509 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-03-19T11:55:13.703539509Z I0319 11:55:13.703525 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-03-19T11:55:13.704587482Z I0319 11:55:13.704531 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-03-19T11:55:13.704587482Z I0319 11:55:13.704562 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-03-19T11:55:18.698774500Z I0319 11:55:18.698648 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:55:29.117250377Z E0319 11:55:29.117131 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{openshift-apiserver-operator.189e3c04ed20eb4f openshift-apiserver-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-apiserver-operator,Name:openshift-apiserver-operator,UID:9db96e7e-3a74-4a64-9c61-c0b917400694,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"openshift-apiserver\" \"4.18.35\"}],Source:EventSource{Component:openshift-apiserver-operator-status-controller-statussyncer_openshift-apiserver,Host:,},FirstTimestamp:2026-03-19 11:54:55.086447439 +0000 UTC m=+56.572062605,LastTimestamp:2026-03-19 11:54:55.086447439 +0000 UTC m=+56.572062605,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-apiserver-operator-status-controller-statussyncer_openshift-apiserver,ReportingInstance:,}" 2026-03-19T11:55:47.705653907Z E0319 11:55:47.705593 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:47.705653907Z W0319 11:55:47.705639 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-mjs7x.json0000640000000000000000000001442615156762311030016 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-d65958b8-mjs7x","generateName":"openshift-apiserver-operator-d65958b8-","namespace":"openshift-apiserver-operator","uid":"f08c5930-44f0-48e4-80dd-2563f2733b2f","resourceVersion":"9584","creationTimestamp":"2026-03-19T11:51:44Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"d65958b8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-d65958b8","uid":"6e8cd617-671c-49ff-8c83-65af97b7c65e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-h84l9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-h84l9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-03-19T11:53:37Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:58Z","finishedAt":"2026-03-19T11:55:47Z","containerID":"cri-o://41d4637f09562b9b79d583fb65c9acfd7f81986cff143ad48c1c09b266f39b23"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","containerID":"cri-o://5870367e9f384c10e7c8ab460353d1a0b2fecef665e3a06de42ad5c0ffebc680","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-h84l9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}machine-api-operator_current.log0000640000000000000000000002745615156762311033237 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c2026-03-19T11:57:39.441350628Z I0319 11:57:39.441094 1 start.go:72] Version: 4.18.0-202602261953.p2.g609dbab.assembly.stream.el9 2026-03-19T11:57:39.441459091Z I0319 11:57:39.441434 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:57:39.456531107Z I0319 11:57:39.455442 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/machine-api-operator... 2026-03-19T11:57:39.470453787Z I0319 11:57:39.470299 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/machine-api-operator 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486000 1 operator.go:217] Starting Machine API Operator 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486144 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486159 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486183 1 reflector.go:305] Starting reflector *v1.DaemonSet (15m26.104771079s) from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486193 1 reflector.go:341] Listing and watching *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486355 1 reflector.go:305] Starting reflector *v1beta1.MachineSet (14m45.166384554s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486375 1 reflector.go:341] Listing and watching *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486381 1 reflector.go:305] Starting reflector *v1.ClusterVersion (18m13.928178744s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486413 1 reflector.go:341] Listing and watching *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486550 1 reflector.go:305] Starting reflector *v1.FeatureGate (18m13.928178744s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486558 1 reflector.go:341] Listing and watching *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486650 1 reflector.go:305] Starting reflector *v1beta1.Machine (14m45.166384554s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486656 1 reflector.go:341] Listing and watching *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486718 1 reflector.go:305] Starting reflector *v1.ValidatingWebhookConfiguration (15m26.104771079s) from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486727 1 reflector.go:341] Listing and watching *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486771 1 reflector.go:305] Starting reflector *v1.MutatingWebhookConfiguration (15m26.104771079s) from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486784 1 reflector.go:341] Listing and watching *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486790 1 reflector.go:305] Starting reflector *v1.Deployment (15m26.104771079s) from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486870 1 reflector.go:341] Listing and watching *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486939 1 reflector.go:305] Starting reflector *v1.Proxy (18m13.928178744s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.486945 1 reflector.go:341] Listing and watching *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.487013 1 reflector.go:305] Starting reflector *v1.ClusterOperator (18m13.928178744s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.489000132Z I0319 11:57:39.487022 1 reflector.go:341] Listing and watching *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.493675109Z I0319 11:57:39.493559 1 reflector.go:368] Caches populated for *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.494202306Z I0319 11:57:39.494182 1 reflector.go:368] Caches populated for *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.501997552Z I0319 11:57:39.501936 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.502055534Z I0319 11:57:39.502027 1 reflector.go:368] Caches populated for *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-19T11:57:39.502055534Z I0319 11:57:39.502041 1 reflector.go:368] Caches populated for *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.502244010Z I0319 11:57:39.502228 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.502767167Z I0319 11:57:39.502746 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.503456519Z I0319 11:57:39.503430 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:57:39.508120486Z I0319 11:57:39.508042 1 reflector.go:368] Caches populated for *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-19T11:57:39.514364393Z I0319 11:57:39.513199 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-19T11:57:39.586376787Z I0319 11:57:39.586310 1 operator.go:229] Synced up caches 2026-03-19T11:57:39.586376787Z I0319 11:57:39.586340 1 operator.go:234] Started feature gate accessor 2026-03-19T11:57:39.586499841Z I0319 11:57:39.586479 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-03-19T11:57:39.586534872Z I0319 11:57:39.586483 1 start.go:121] Synced up machine api informer caches 2026-03-19T11:57:39.587723690Z I0319 11:57:39.587669 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-machine-api", Name:"machine-api-operator", UID:"e4493c97-5f5a-4b04-ac8f-f0427b0dc565", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-03-19T11:57:40.744940529Z I0319 11:57:40.743937 1 status.go:63] Syncing status: progressing 2026-03-19T11:57:40.744940529Z I0319 11:57:40.744288 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterOperator", Namespace:"", Name:"machine-api", UID:"c2327988-bd20-43b4-9b56-1ae91eb106d6", APIVersion:"config.openshift.io/v1", ResourceVersion:"10533", FieldPath:""}): type: 'Normal' reason: 'Status upgrade' Progressing towards operator: 4.18.35 2026-03-19T11:57:40.778220450Z I0319 11:57:40.775500 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-03-19T11:57:40.786772310Z I0319 11:57:40.786481 1 status.go:99] Syncing status: available 2026-03-19T11:57:41.085047628Z I0319 11:57:41.084965 1 request.go:632] Waited for 190.230906ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-03-19T11:57:41.088225299Z I0319 11:57:41.088194 1 status.go:69] Syncing status: re-syncing 2026-03-19T11:57:41.282955147Z I0319 11:57:41.282878 1 request.go:632] Waited for 194.492331ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status 2026-03-19T11:57:41.289302568Z I0319 11:57:41.289248 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-03-19T11:57:41.482465067Z I0319 11:57:41.482313 1 request.go:632] Waited for 192.966793ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-03-19T11:57:41.485459582Z I0319 11:57:41.485370 1 status.go:99] Syncing status: available 2026-03-19T11:57:41.682663568Z I0319 11:57:41.682575 1 request.go:632] Waited for 197.068502ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status kube-rbac-proxy_current.log0000640000000000000000000001524715156762311032240 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-6fbb6cf6f9-75w5c2026-03-19T11:57:20.044071437Z I0319 11:57:20.043380 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043510 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043529 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043533 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043537 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043548 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043552 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043556 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043565 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043569 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043573 1 flags.go:64] FLAG: --help="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043577 1 flags.go:64] FLAG: --http2-disable="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043581 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043585 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043589 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043595 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043599 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043604 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043609 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043613 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043618 1 flags.go:64] FLAG: --log-dir="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043622 1 flags.go:64] FLAG: --log-file="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043625 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043635 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043640 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043644 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043647 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043651 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043654 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043658 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043662 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043669 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043673 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043677 1 flags.go:64] FLAG: --one-output="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043681 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043685 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043689 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043693 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043697 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043700 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043704 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043719 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043724 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043728 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043733 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043737 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043741 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043745 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043748 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043752 1 flags.go:64] FLAG: --v="3" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043756 1 flags.go:64] FLAG: --version="false" 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043763 1 flags.go:64] FLAG: --vmodule="" 2026-03-19T11:57:20.044071437Z W0319 11:57:20.043775 1 deprecated.go:66] 2026-03-19T11:57:20.044071437Z ==== Removed Flag Warning ====================== 2026-03-19T11:57:20.044071437Z 2026-03-19T11:57:20.044071437Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-19T11:57:20.044071437Z 2026-03-19T11:57:20.044071437Z =============================================== 2026-03-19T11:57:20.044071437Z 2026-03-19T11:57:20.044071437Z I0319 11:57:20.043786 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-03-19T11:57:20.044677555Z I0319 11:57:20.044528 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-19T11:57:20.048046332Z I0319 11:57:20.047967 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-19T11:57:20.048369282Z I0319 11:57:20.048332 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-19T11:57:20.048645671Z I0319 11:57:20.048619 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 control-plane-machine-set-operator_current.log0000640000000000000000000002642615156762311040520 0ustar0000000000000000config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-6f97756bc8-tql862026-03-19T11:57:23.216269521Z I0319 11:57:23.216031 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:57:23.217247211Z I0319 11:57:23.217195 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-03-19T11:57:23.226495634Z I0319 11:57:23.225981 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.189e3c276aecfa41 dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:FeatureGatesInitialized,Message:FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}},Source:EventSource{Component:,Host:,},FirstTimestamp:2026-03-19 11:57:23.225860673 +0000 UTC m=+0.085506740,LastTimestamp:2026-03-19 11:57:23.225860673 +0000 UTC m=+0.085506740,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-03-19T11:57:23.226495634Z I0319 11:57:23.226041 1 main.go:175] FeatureGates initialized: [AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-03-19T11:57:23.226495634Z I0319 11:57:23.226264 1 webhook.go:186] "skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" 2026-03-19T11:57:23.226495634Z I0319 11:57:23.226297 1 webhook.go:202] "Registering a validating webhook" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-03-19T11:57:23.226495634Z I0319 11:57:23.226382 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-03-19T11:57:23.226495634Z I0319 11:57:23.226416 1 main.go:230] "starting manager" logger="setup" 2026-03-19T11:57:23.227329360Z I0319 11:57:23.227238 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-03-19T11:57:23.227329360Z I0319 11:57:23.227298 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-03-19T11:57:23.227380732Z I0319 11:57:23.227360 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2026-03-19T11:57:23.227509056Z I0319 11:57:23.227481 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/control-plane-machine-set-leader... 2026-03-19T11:57:23.227636009Z I0319 11:57:23.227617 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-03-19T11:57:23.227713722Z I0319 11:57:23.227679 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2026-03-19T11:57:23.227779914Z I0319 11:57:23.227762 1 certwatcher.go:115] "Starting certificate watcher" logger="controller-runtime.certwatcher" 2026-03-19T11:57:23.227860026Z I0319 11:57:23.227829 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false 2026-03-19T11:57:23.235460627Z I0319 11:57:23.235411 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/control-plane-machine-set-leader 2026-03-19T11:57:23.235846119Z I0319 11:57:23.235737 1 recorder.go:104] "control-plane-machine-set-operator-6f97756bc8-tql86_f44263c5-1ecd-4a43-a903-ad1575af904d became leader" logger="events" type="Normal" object={"kind":"Lease","namespace":"openshift-machine-api","name":"control-plane-machine-set-leader","uid":"ac62a09a-4674-45f1-b224-2516f9f43ae1","apiVersion":"coordination.k8s.io/v1","resourceVersion":"10410"} reason="LeaderElection" 2026-03-19T11:57:23.237981756Z I0319 11:57:23.237931 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1.ControlPlaneMachineSet" 2026-03-19T11:57:23.238004487Z I0319 11:57:23.237977 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1beta1.Machine" 2026-03-19T11:57:23.238004487Z I0319 11:57:23.237987 1 controller.go:183] "Starting Controller" controller="controlplanemachinesetgenerator" 2026-03-19T11:57:23.238043688Z I0319 11:57:23.238012 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ControlPlaneMachineSet" 2026-03-19T11:57:23.238113381Z I0319 11:57:23.238092 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1beta1.Machine" 2026-03-19T11:57:23.238113381Z I0319 11:57:23.238106 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Node" 2026-03-19T11:57:23.238193763Z I0319 11:57:23.238164 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ClusterOperator" 2026-03-19T11:57:23.238193763Z I0319 11:57:23.238177 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Infrastructure" 2026-03-19T11:57:23.238193763Z I0319 11:57:23.238183 1 controller.go:183] "Starting Controller" controller="controlplanemachineset" 2026-03-19T11:57:23.347289968Z I0319 11:57:23.347224 1 controller.go:217] "Starting workers" controller="controlplanemachineset" worker count=1 2026-03-19T11:57:23.347362180Z I0319 11:57:23.347289 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="6489e9f1-4c20-42d7-9800-46ee398e7deb" namespace="openshift-machine-api" name="cluster" 2026-03-19T11:57:23.347404442Z I0319 11:57:23.347382 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="6489e9f1-4c20-42d7-9800-46ee398e7deb" namespace="openshift-machine-api" name="cluster" 2026-03-19T11:57:23.348350721Z I0319 11:57:23.348323 1 controller.go:217] "Starting workers" controller="controlplanemachinesetgenerator" worker count=1 2026-03-19T11:57:23.354971240Z I0319 11:57:23.354917 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="6489e9f1-4c20-42d7-9800-46ee398e7deb" namespace="openshift-machine-api" name="cluster" 2026-03-19T11:57:23.354993461Z I0319 11:57:23.354977 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="73f5e821-9cc8-42e5-be1a-07fd03d0d6bb" namespace="openshift-machine-api" name="cluster" 2026-03-19T11:57:23.355042363Z I0319 11:57:23.355014 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="73f5e821-9cc8-42e5-be1a-07fd03d0d6bb" namespace="openshift-machine-api" name="cluster" 2026-03-19T11:57:23.355088464Z I0319 11:57:23.355064 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="73f5e821-9cc8-42e5-be1a-07fd03d0d6bb" namespace="openshift-machine-api" name="cluster" baremetal-kube-rbac-proxy_current.log0000640000000000000000000001552515156762311035250 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml62026-03-19T11:54:41.391867018Z I0319 11:54:41.379691 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379839 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379847 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379851 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379854 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379862 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379865 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379867 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379871 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379877 1 flags.go:64] FLAG: --config-file="/etc/baremetal-kube-rbac-proxy/config-file.yaml" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379880 1 flags.go:64] FLAG: --help="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379884 1 flags.go:64] FLAG: --http2-disable="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379886 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379893 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379896 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379900 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379903 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379907 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379911 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379914 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379916 1 flags.go:64] FLAG: --log-dir="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379919 1 flags.go:64] FLAG: --log-file="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379922 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379926 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379929 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379932 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379968 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379972 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379975 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379978 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379981 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379988 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379991 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379993 1 flags.go:64] FLAG: --one-output="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379996 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.379999 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380002 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380005 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380008 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380011 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380014 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380020 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380023 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380026 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380030 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380033 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380036 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380038 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380041 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380044 1 flags.go:64] FLAG: --v="10" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380047 1 flags.go:64] FLAG: --version="false" 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380052 1 flags.go:64] FLAG: --vmodule="" 2026-03-19T11:54:41.391867018Z W0319 11:54:41.380064 1 deprecated.go:66] 2026-03-19T11:54:41.391867018Z ==== Removed Flag Warning ====================== 2026-03-19T11:54:41.391867018Z 2026-03-19T11:54:41.391867018Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-19T11:54:41.391867018Z 2026-03-19T11:54:41.391867018Z =============================================== 2026-03-19T11:54:41.391867018Z 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380071 1 kube-rbac-proxy.go:530] Reading config file: /etc/baremetal-kube-rbac-proxy/config-file.yaml 2026-03-19T11:54:41.391867018Z I0319 11:54:41.380700 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-19T11:54:41.391867018Z I0319 11:54:41.381837 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-19T11:54:41.391867018Z I0319 11:54:41.381890 1 reloader.go:99] reloading key /etc/tls/private/tls.key certificate /etc/tls/private/tls.crt 2026-03-19T11:54:41.391867018Z I0319 11:54:41.382927 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-19T11:54:41.391867018Z I0319 11:54:41.383736 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 cluster-baremetal-operator_current.log0000640000000000000000000001323015156762311035537 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml62026-03-19T11:57:00.563787225Z I0319 11:57:00.563592 1 webhook.go:104] WebhookDependenciesReady: everything ready for webhooks 2026-03-19T11:57:00.585788830Z I0319 11:57:00.582901 1 clusteroperator.go:235] "new CO status" reason="WaitingForProvisioningCR" processMessage="" message="Waiting for Provisioning CR on BareMetal Platform" 2026-03-19T11:57:00.597875102Z I0319 11:57:00.597531 1 provisioning_controller.go:651] "Network stack calculation" NetworkStack=1 2026-03-19T11:57:00.609920071Z I0319 11:57:00.609841 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.189e3c2226e5826b dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ValidatingWebhookConfigurationUpdated,Message:Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cluster-baremetal-validating-webhook-configuration because it changed,Source:EventSource{Component:,Host:,},FirstTimestamp:2026-03-19 11:57:00.609684075 +0000 UTC m=+0.109814729,LastTimestamp:2026-03-19 11:57:00.609684075 +0000 UTC m=+0.109814729,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-03-19T11:57:00.610047675Z I0319 11:57:00.610018 1 webhook.go:177] "msg"="skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" 2026-03-19T11:57:00.610088657Z I0319 11:57:00.610068 1 webhook.go:193] "msg"="Registering a validating webhook" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-03-19T11:57:00.610449258Z I0319 11:57:00.610151 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-03-19T11:57:00.610449258Z I0319 11:57:00.610253 1 main.go:180] starting manager 2026-03-19T11:57:00.610556132Z I0319 11:57:00.610508 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-03-19T11:57:00.610627234Z I0319 11:57:00.610607 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-03-19T11:57:00.611002846Z I0319 11:57:00.610979 1 server.go:247] "msg"="Serving metrics server" "bindAddress"=":8080" "logger"="controller-runtime.metrics" "secure"=false 2026-03-19T11:57:00.611002846Z I0319 11:57:00.610984 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-03-19T11:57:00.611152261Z I0319 11:57:00.611137 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=9443 2026-03-19T11:57:00.611273815Z I0319 11:57:00.611254 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-03-19T11:57:00.713209234Z I0319 11:57:00.712110 1 leaderelection.go:250] attempting to acquire leader lease openshift-machine-api/cluster-baremetal-operator... 2026-03-19T11:57:00.758448411Z I0319 11:57:00.756615 1 leaderelection.go:260] successfully acquired lease openshift-machine-api/cluster-baremetal-operator 2026-03-19T11:57:00.758448411Z I0319 11:57:00.757010 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1alpha1.Provisioning" 2026-03-19T11:57:00.758448411Z I0319 11:57:00.757032 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Secret" 2026-03-19T11:57:00.758448411Z I0319 11:57:00.757045 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Deployment" 2026-03-19T11:57:00.758448411Z I0319 11:57:00.757058 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Service" 2026-03-19T11:57:00.758448411Z I0319 11:57:00.757072 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.DaemonSet" 2026-03-19T11:57:00.758448411Z I0319 11:57:00.757084 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.ClusterOperator" 2026-03-19T11:57:00.758448411Z I0319 11:57:00.757095 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Proxy" 2026-03-19T11:57:00.758448411Z I0319 11:57:00.757110 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1beta1.Machine" 2026-03-19T11:57:00.758448411Z I0319 11:57:00.757121 1 controller.go:181] "msg"="Starting Controller" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" 2026-03-19T11:57:01.065647922Z I0319 11:57:01.065567 1 controller.go:215] "msg"="Starting workers" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "worker count"=1 cluster-baremetal-operator_previous.log0000640000000000000000000001502015156762311035730 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-6f69995874-ftml62026-03-19T11:54:40.726561289Z I0319 11:54:40.726262 1 webhook.go:104] WebhookDependenciesReady: everything ready for webhooks 2026-03-19T11:54:40.773847451Z I0319 11:54:40.773431 1 clusteroperator.go:235] "new CO status" reason="WaitingForProvisioningCR" processMessage="" message="Waiting for Provisioning CR on BareMetal Platform" 2026-03-19T11:54:40.807631280Z I0319 11:54:40.807565 1 provisioning_controller.go:651] "Network stack calculation" NetworkStack=1 2026-03-19T11:54:40.818741127Z I0319 11:54:40.818682 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.189e3c019ab257be dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ValidatingWebhookConfigurationCreated,Message:Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cluster-baremetal-validating-webhook-configuration because it was missing,Source:EventSource{Component:,Host:,},FirstTimestamp:2026-03-19 11:54:40.818567102 +0000 UTC m=+0.188074642,LastTimestamp:2026-03-19 11:54:40.818567102 +0000 UTC m=+0.188074642,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-03-19T11:54:40.819785990Z I0319 11:54:40.818851 1 webhook.go:177] "msg"="skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" 2026-03-19T11:54:40.819785990Z I0319 11:54:40.818911 1 webhook.go:193] "msg"="Registering a validating webhook" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-03-19T11:54:40.819785990Z I0319 11:54:40.818988 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-03-19T11:54:40.819785990Z I0319 11:54:40.819028 1 main.go:180] starting manager 2026-03-19T11:54:40.819785990Z I0319 11:54:40.819566 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-03-19T11:54:40.820829723Z I0319 11:54:40.820045 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-03-19T11:54:40.820829723Z I0319 11:54:40.820085 1 server.go:247] "msg"="Serving metrics server" "bindAddress"=":8080" "logger"="controller-runtime.metrics" "secure"=false 2026-03-19T11:54:40.820829723Z I0319 11:54:40.820318 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-03-19T11:54:40.820829723Z I0319 11:54:40.820456 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=9443 2026-03-19T11:54:40.820829723Z I0319 11:54:40.820526 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-03-19T11:54:40.921515766Z I0319 11:54:40.921294 1 leaderelection.go:250] attempting to acquire leader lease openshift-machine-api/cluster-baremetal-operator... 2026-03-19T11:54:40.942629457Z I0319 11:54:40.942566 1 leaderelection.go:260] successfully acquired lease openshift-machine-api/cluster-baremetal-operator 2026-03-19T11:54:40.942912616Z I0319 11:54:40.942885 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1alpha1.Provisioning" 2026-03-19T11:54:40.942912616Z I0319 11:54:40.942907 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Secret" 2026-03-19T11:54:40.942951137Z I0319 11:54:40.942919 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Deployment" 2026-03-19T11:54:40.942951137Z I0319 11:54:40.942929 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Service" 2026-03-19T11:54:40.942951137Z I0319 11:54:40.942940 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.DaemonSet" 2026-03-19T11:54:40.942961957Z I0319 11:54:40.942950 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.ClusterOperator" 2026-03-19T11:54:40.942970598Z I0319 11:54:40.942960 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Proxy" 2026-03-19T11:54:40.942979078Z I0319 11:54:40.942972 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1beta1.Machine" 2026-03-19T11:54:40.942987418Z I0319 11:54:40.942982 1 controller.go:181] "msg"="Starting Controller" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" 2026-03-19T11:54:41.184355138Z I0319 11:54:41.184292 1 controller.go:215] "msg"="Starting workers" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "worker count"=1 2026-03-19T11:55:40.960017851Z E0319 11:55:40.959885 1 leaderelection.go:340] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-19T11:56:40.961580253Z E0319 11:56:40.961227 1 leaderelection.go:347] error retrieving resource lock openshift-machine-api/cluster-baremetal-operator: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-baremetal-operator) 2026-03-19T11:56:53.974873226Z I0319 11:56:53.973781 1 leaderelection.go:285] failed to renew lease openshift-machine-api/cluster-baremetal-operator: timed out waiting for the condition 2026-03-19T11:56:59.752982274Z E0319 11:56:59.752404 1 main.go:182] "problem running manager" err="leader election lost" config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6.json0000640000000000000000000002442015156762311026037 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-operator-6f69995874-ftml6","generateName":"cluster-baremetal-operator-6f69995874-","namespace":"openshift-machine-api","uid":"19de6601-10d4-4112-a21f-0398d2b160d1","resourceVersion":"9778","creationTimestamp":"2026-03-19T11:51:45Z","labels":{"k8s-app":"cluster-baremetal-operator","pod-template-hash":"6f69995874"},"annotations":{"capability.openshift.io/name":"baremetal","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.24/23\"],\"mac_address\":\"0a:58:0a:80:00:18\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.24/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.24\"\n ],\n \"mac\": \"0a:58:0a:80:00:18\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-baremetal-operator-6f69995874","uid":"399215cc-9b6f-49ca-a400-667f72e75c5b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-baremetal-webhook-server-cert","defaultMode":420}},{"name":"config","configMap":{"name":"baremetal-kube-rbac-proxy","defaultMode":420}},{"name":"cluster-baremetal-operator-tls","secret":{"secretName":"cluster-baremetal-operator-tls","defaultMode":420}},{"name":"images","configMap":{"name":"cluster-baremetal-operator-images","defaultMode":420}},{"name":"kube-api-access-6xpc2","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-baremetal-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","command":["/usr/bin/cluster-baremetal-operator"],"args":["--enable-leader-election"],"ports":[{"name":"webhook-server","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/tls"},{"name":"images","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/images"},{"name":"kube-api-access-6xpc2","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"baremetal-kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--config-file=/etc/baremetal-kube-rbac-proxy/config-file.yaml","--logtostderr=true","--v=10"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-6xpc2","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-baremetal-operator","serviceAccount":"cluster-baremetal-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"runAsUser":65534,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:01Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:01Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.24","podIPs":[{"ip":"10.128.0.24"}],"startTime":"2026-03-19T11:53:37Z","containerStatuses":[{"name":"baremetal-kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-19T11:54:41Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://68c205a7cfb2de9d6da9f6cfb9c833d6d4d07f368dbd0c842790192b58bcaa3f","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-6xpc2","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"cluster-baremetal-operator","state":{"running":{"startedAt":"2026-03-19T11:57:00Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"rovisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.Service\"\nI0319 11:54:40.942940 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.DaemonSet\"\nI0319 11:54:40.942950 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.ClusterOperator\"\nI0319 11:54:40.942960 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.Proxy\"\nI0319 11:54:40.942972 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1beta1.Machine\"\nI0319 11:54:40.942982 1 controller.go:181] \"msg\"=\"Starting Controller\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\"\nI0319 11:54:41.184292 1 controller.go:215] \"msg\"=\"Starting workers\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"worker count\"=1\nE0319 11:55:40.959885 1 leaderelection.go:340] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0319 11:56:40.961227 1 leaderelection.go:347] error retrieving resource lock openshift-machine-api/cluster-baremetal-operator: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-baremetal-operator)\nI0319 11:56:53.973781 1 leaderelection.go:285] failed to renew lease openshift-machine-api/cluster-baremetal-operator: timed out waiting for the condition\nE0319 11:56:59.752404 1 main.go:182] \"problem running manager\" err=\"leader election lost\"\n","startedAt":"2026-03-19T11:54:40Z","finishedAt":"2026-03-19T11:56:59Z","containerID":"cri-o://612732ed0120924fb77ef10b06bafbb001e3d8734f333029971f71583a5972b4"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","containerID":"cri-o://dbd72cd315e8f5fa6faaefc2be981b3f9a0d499a3d7eead86b3d71318cde1c34","started":true,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-baremetal-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"images","mountPath":"/etc/cluster-baremetal-operator/images","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-6xpc2","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}cluster-autoscaler-operator_current.log0000640000000000000000000001710315156762311036174 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-866dc4744-fblgs2026-03-19T11:57:39.352833613Z I0319 11:57:39.352246 1 main.go:15] Go Version: go1.22.12 (Red Hat 1.22.12-8.el9) X:strictfipsruntime 2026-03-19T11:57:39.352833613Z I0319 11:57:39.352386 1 main.go:16] Go OS/Arch: linux/amd64 2026-03-19T11:57:39.352833613Z I0319 11:57:39.352391 1 main.go:17] Version: cluster-autoscaler-operator v4.18.0-202602261953.p2.g474ad65.assembly.stream.el9+ose-cluster-autoscaler-operator 2026-03-19T11:57:39.352833613Z I0319 11:57:39.352633 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:57:39.376090837Z I0319 11:57:39.374232 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-clusterautoscalers" 2026-03-19T11:57:39.376090837Z I0319 11:57:39.374279 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-machineautoscalers" 2026-03-19T11:57:39.376090837Z I0319 11:57:39.374434 1 main.go:41] Starting cluster-autoscaler-operator 2026-03-19T11:57:39.376321494Z I0319 11:57:39.376297 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-03-19T11:57:39.376604773Z I0319 11:57:39.376577 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-03-19T11:57:39.376675635Z I0319 11:57:39.376654 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/cluster-autoscaler-operator-leader... 2026-03-19T11:57:39.376940034Z I0319 11:57:39.376921 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-03-19T11:57:39.377122130Z I0319 11:57:39.377106 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=8443 2026-03-19T11:57:39.377184201Z I0319 11:57:39.376599 1 server.go:247] "msg"="Serving metrics server" "bindAddress"="127.0.0.1:9191" "logger"="controller-runtime.metrics" "secure"=false 2026-03-19T11:57:39.377288725Z I0319 11:57:39.377276 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-03-19T11:57:39.389513411Z I0319 11:57:39.389469 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/cluster-autoscaler-operator-leader 2026-03-19T11:57:39.389887692Z I0319 11:57:39.389867 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ClusterAutoscaler" 2026-03-19T11:57:39.389931984Z I0319 11:57:39.389922 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Deployment" 2026-03-19T11:57:39.390328316Z I0319 11:57:39.390314 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Service" 2026-03-19T11:57:39.390376458Z I0319 11:57:39.390365 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ServiceMonitor" 2026-03-19T11:57:39.390416679Z I0319 11:57:39.390405 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.PrometheusRule" 2026-03-19T11:57:39.390452200Z I0319 11:57:39.390441 1 controller.go:183] "msg"="Starting Controller" "controller"="cluster_autoscaler_controller" 2026-03-19T11:57:39.390494002Z I0319 11:57:39.390166 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *v1beta1.MachineAutoscaler" 2026-03-19T11:57:39.390556824Z I0319 11:57:39.390544 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *unstructured.Unstructured" 2026-03-19T11:57:39.390594335Z I0319 11:57:39.390584 1 controller.go:183] "msg"="Starting Controller" "controller"="machine_autoscaler_controller" 2026-03-19T11:57:39.390690788Z I0319 11:57:39.390201 1 status.go:341] Starting status reporter: cluster operator informers 2026-03-19T11:57:39.490919372Z I0319 11:57:39.490857 1 status.go:352] Starting status reporter: worker 2026-03-19T11:57:39.502317322Z I0319 11:57:39.502258 1 status.go:437] machine-api-operator not ready yet 2026-03-19T11:57:39.502317322Z W0319 11:57:39.502276 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-19T11:57:39.506152374Z I0319 11:57:39.506110 1 webhookconfig.go:72] Webhook configuration status: created 2026-03-19T11:57:39.539909710Z I0319 11:57:39.539839 1 status.go:437] machine-api-operator not ready yet 2026-03-19T11:57:39.539909710Z W0319 11:57:39.539873 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-19T11:57:39.542048767Z I0319 11:57:39.541942 1 controller.go:217] "msg"="Starting workers" "controller"="cluster_autoscaler_controller" "worker count"=1 2026-03-19T11:57:39.542464960Z I0319 11:57:39.542424 1 controller.go:217] "msg"="Starting workers" "controller"="machine_autoscaler_controller" "worker count"=1 2026-03-19T11:57:39.665277868Z I0319 11:57:39.665235 1 status.go:437] machine-api-operator not ready yet 2026-03-19T11:57:39.665277868Z W0319 11:57:39.665252 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-19T11:57:40.718780954Z I0319 11:57:40.717604 1 status.go:437] machine-api-operator not ready yet 2026-03-19T11:57:40.718780954Z W0319 11:57:40.717626 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-19T11:57:40.736850544Z I0319 11:57:40.735582 1 status.go:437] machine-api-operator not ready yet 2026-03-19T11:57:40.736850544Z W0319 11:57:40.735606 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-19T11:57:40.772209241Z I0319 11:57:40.772129 1 status.go:437] machine-api-operator not ready yet 2026-03-19T11:57:40.772209241Z W0319 11:57:40.772164 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-19T11:57:40.789405773Z I0319 11:57:40.789337 1 status.go:437] machine-api-operator not ready yet 2026-03-19T11:57:40.789405773Z W0319 11:57:40.789361 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-19T11:57:40.824571974Z I0319 11:57:40.824521 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-19T11:57:40.824571974Z I0319 11:57:40.824541 1 status.go:244] Operator status available: at version 4.18.35 2026-03-19T11:57:40.845740322Z I0319 11:57:40.844927 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-19T11:57:40.845740322Z I0319 11:57:40.844946 1 status.go:244] Operator status available: at version 4.18.35 2026-03-19T11:57:41.331717797Z I0319 11:57:41.331632 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-19T11:57:41.331717797Z I0319 11:57:41.331678 1 status.go:244] Operator status available: at version 4.18.35 2026-03-19T11:57:54.497456905Z I0319 11:57:54.497301 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-19T11:57:54.497456905Z I0319 11:57:54.497336 1 status.go:244] Operator status available: at version 4.18.35 2026-03-19T11:57:57.648460529Z I0319 11:57:57.648387 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-19T11:57:57.648460529Z I0319 11:57:57.648413 1 status.go:244] Operator status available: at version 4.18.35 kube-rbac-proxy_current.log0000640000000000000000000001524715156762311033543 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-866dc4744-fblgs2026-03-19T11:57:20.039234273Z I0319 11:57:20.039026 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039183 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039188 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039192 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039195 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039199 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039202 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039206 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039212 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039215 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039219 1 flags.go:64] FLAG: --help="false" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039222 1 flags.go:64] FLAG: --http2-disable="false" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039224 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-19T11:57:20.039234273Z I0319 11:57:20.039228 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039231 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039234 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039237 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039241 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039245 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039248 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039251 1 flags.go:64] FLAG: --log-dir="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039254 1 flags.go:64] FLAG: --log-file="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039256 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039260 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039264 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039267 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039270 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039274 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039277 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039280 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039283 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039293 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039297 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039299 1 flags.go:64] FLAG: --one-output="false" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039302 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039305 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:9192" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039307 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039310 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039313 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039315 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039318 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039512 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039516 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039520 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039524 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:9191/" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039527 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039529 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039532 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039535 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039538 1 flags.go:64] FLAG: --v="3" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039541 1 flags.go:64] FLAG: --version="false" 2026-03-19T11:57:20.039564964Z I0319 11:57:20.039545 1 flags.go:64] FLAG: --vmodule="" 2026-03-19T11:57:20.039564964Z W0319 11:57:20.039556 1 deprecated.go:66] 2026-03-19T11:57:20.039564964Z ==== Removed Flag Warning ====================== 2026-03-19T11:57:20.039564964Z 2026-03-19T11:57:20.039564964Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-19T11:57:20.039564964Z 2026-03-19T11:57:20.039564964Z =============================================== 2026-03-19T11:57:20.039564964Z 2026-03-19T11:57:20.039595005Z I0319 11:57:20.039566 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-03-19T11:57:20.040218835Z I0319 11:57:20.040187 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-19T11:57:20.041380522Z I0319 11:57:20.041348 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-19T11:57:20.041912588Z I0319 11:57:20.041626 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9192 2026-03-19T11:57:20.042318741Z I0319 11:57:20.042029 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9192 kube-scheduler-operator-container_current.log0000640000000000000000000001021515156762311043134 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-ptqdh2026-03-19T11:56:48.330481651Z I0319 11:56:48.325747 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:56:48.330481651Z I0319 11:56:48.326136 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:56:48.330481651Z I0319 11:56:48.327494 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:48.356264254Z I0319 11:56:48.356185 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702 2026-03-19T11:56:59.832068410Z I0319 11:56:59.830699 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:56:59.832068410Z W0319 11:56:59.830744 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.832068410Z W0319 11:56:59.830750 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.832068410Z W0319 11:56:59.830754 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:56:59.832068410Z W0319 11:56:59.830757 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:56:59.832068410Z W0319 11:56:59.830760 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:56:59.832068410Z W0319 11:56:59.830764 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:56:59.837849203Z I0319 11:56:59.837750 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:56:59.848390646Z I0319 11:56:59.848305 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:56:59.850056469Z I0319 11:56:59.850023 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:56:59.850056469Z I0319 11:56:59.850049 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:56:59.850407020Z I0319 11:56:59.850086 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:56:59.850407020Z I0319 11:56:59.850207 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:56:59.850407020Z I0319 11:56:59.850298 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-03-19T11:56:59.850777912Z I0319 11:56:59.850547 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:56:59.850777912Z I0319 11:56:59.850573 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:59.850777912Z I0319 11:56:59.850594 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:56:59.850777912Z I0319 11:56:59.850600 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.951009866Z I0319 11:56:59.950948 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.951135240Z I0319 11:56:59.951003 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:56:59.951251504Z I0319 11:56:59.951015 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000004352715156762311043342 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-ptqdh2026-03-19T11:54:51.414829978Z I0319 11:54:51.412439 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"845dc020-e8a1-427f-827b-2ff0f526d351", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing 2026-03-19T11:54:51.753195766Z I0319 11:54:51.753102 1 request.go:700] Waited for 1.041024235s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller 2026-03-19T11:54:52.953845620Z I0319 11:54:52.953280 1 request.go:700] Waited for 1.397729097s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-3-master-0 2026-03-19T11:54:54.355258815Z I0319 11:54:54.354134 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"845dc020-e8a1-427f-827b-2ff0f526d351", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing 2026-03-19T11:54:54.361919604Z I0319 11:54:54.356206 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-19T11:54:54.586935799Z I0319 11:54:54.585068 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"845dc020-e8a1-427f-827b-2ff0f526d351", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing 2026-03-19T11:54:54.628235814Z I0319 11:54:54.628191 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:54:54.629484172Z I0319 11:54:54.629434 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"845dc020-e8a1-427f-827b-2ff0f526d351", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RevisionTriggered' new revision 4 triggered by "required configmap/serviceaccount-ca has changed" 2026-03-19T11:54:54.661274970Z I0319 11:54:54.661223 1 prune_controller.go:277] Nothing to prune 2026-03-19T11:55:19.276728781Z I0319 11:55:19.276645 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="51d0512d7c4195be513a35278f02885502358156135b1c7d5b2f30ca773bd1a3") 2026-03-19T11:55:19.276900856Z W0319 11:55:19.276889 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-19T11:55:19.276983499Z I0319 11:55:19.276971 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="15a41d153ec2b564c582ac0230f5e0631faa6e9236b2c0be76159a2795d4ba38") 2026-03-19T11:55:19.277081052Z I0319 11:55:19.277034 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-19T11:55:19.277090612Z I0319 11:55:19.277060 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-19T11:55:19.277097632Z I0319 11:55:19.277084 1 base_controller.go:181] Shutting down PruneController ... 2026-03-19T11:55:19.277121123Z I0319 11:55:19.277100 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-19T11:55:19.277128593Z I0319 11:55:19.277123 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:55:19.277148594Z I0319 11:55:19.277135 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-19T11:55:19.277148594Z I0319 11:55:19.277142 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-19T11:55:19.277223726Z I0319 11:55:19.277209 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-19T11:55:19.277223726Z I0319 11:55:19.277219 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-19T11:55:19.277231747Z I0319 11:55:19.277224 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-19T11:55:19.277231747Z I0319 11:55:19.277228 1 controller_manager.go:54] PruneController controller terminated 2026-03-19T11:55:19.277240567Z I0319 11:55:19.277236 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-19T11:55:19.277247497Z I0319 11:55:19.277238 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-19T11:55:19.277247497Z I0319 11:55:19.277245 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:55:19.277267228Z I0319 11:55:19.277253 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-19T11:55:19.277267228Z I0319 11:55:19.277263 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-19T11:55:19.277366991Z I0319 11:55:19.277355 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:55:19.277406432Z I0319 11:55:19.277109 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-19T11:55:19.277431093Z I0319 11:55:19.277422 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-19T11:55:19.277462554Z I0319 11:55:19.277454 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-19T11:55:19.277501235Z I0319 11:55:19.277477 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-19T11:55:19.277520166Z I0319 11:55:19.277486 1 base_controller.go:181] Shutting down GuardController ... 2026-03-19T11:55:19.277548957Z I0319 11:55:19.277539 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-19T11:55:19.277569867Z I0319 11:55:19.277543 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-19T11:55:19.277605928Z I0319 11:55:19.277597 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-19T11:55:19.277627309Z I0319 11:55:19.277608 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-19T11:55:19.277662490Z I0319 11:55:19.277651 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-19T11:55:19.277690251Z I0319 11:55:19.277682 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-19T11:55:19.277708862Z I0319 11:55:19.277695 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:55:19.277741413Z I0319 11:55:19.277724 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:55:19.277781044Z I0319 11:55:19.277738 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:55:19.277832406Z I0319 11:55:19.277756 1 base_controller.go:181] Shutting down Installer ... 2026-03-19T11:55:19.277884597Z I0319 11:55:19.277865 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-19T11:55:19.277923959Z I0319 11:55:19.277901 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2864438666/tls.crt::/tmp/serving-cert-2864438666/tls.key" 2026-03-19T11:55:19.277943009Z I0319 11:55:19.277927 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-19T11:55:19.277950329Z I0319 11:55:19.277942 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-19T11:55:19.278021312Z I0319 11:55:19.278002 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-19T11:55:19.278077063Z I0319 11:55:19.278054 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:55:19.278085734Z I0319 11:55:19.278076 1 builder.go:335] server exited 2026-03-19T11:55:19.278115145Z E0319 11:55:19.278095 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:19.278136505Z I0319 11:55:19.278124 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-19T11:55:19.278145516Z I0319 11:55:19.278141 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-19T11:55:19.278213038Z I0319 11:55:19.278190 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-19T11:55:19.278221848Z I0319 11:55:19.278214 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-19T11:55:19.278256789Z I0319 11:55:19.278238 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-19T11:55:19.279071375Z W0319 11:55:19.279046 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:55:19.279108426Z W0319 11:55:19.279098 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:55:19.279130047Z W0319 11:55:19.279121 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-19T11:55:19.279214839Z E0319 11:55:19.279192 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:19.279223590Z I0319 11:55:19.279216 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-19T11:55:19.279231980Z I0319 11:55:19.279226 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-19T11:55:19.279238710Z I0319 11:55:19.279232 1 controller_manager.go:54] GuardController controller terminated 2026-03-19T11:55:19.279258531Z I0319 11:55:19.279245 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-19T11:55:19.279265891Z I0319 11:55:19.279260 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-19T11:55:19.279272611Z I0319 11:55:19.279268 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-19T11:55:19.279279251Z I0319 11:55:19.279273 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-19T11:55:19.279285882Z I0319 11:55:19.279281 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:55:19.279292532Z I0319 11:55:19.279287 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:55:19.279299192Z I0319 11:55:19.279291 1 controller_manager.go:54] RevisionController controller terminated 2026-03-19T11:55:19.279307402Z I0319 11:55:19.279302 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-19T11:55:19.279334933Z I0319 11:55:19.279321 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:55:19.279342603Z I0319 11:55:19.279333 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:55:19.279342603Z I0319 11:55:19.279338 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-19T11:55:19.279380405Z E0319 11:55:19.279368 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:19.279427725Z I0319 11:55:19.279405 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-19T11:55:19.279427725Z I0319 11:55:19.279424 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-19T11:55:19.279436545Z I0319 11:55:19.279431 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-19T11:55:19.279459456Z I0319 11:55:19.279448 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-19T11:55:19.279492797Z I0319 11:55:19.279470 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-19T11:55:19.279492797Z I0319 11:55:19.279488 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-19T11:55:19.279515688Z I0319 11:55:19.279505 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:55:19.279538859Z I0319 11:55:19.279530 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-19T11:55:19.279560999Z E0319 11:55:19.279529 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:19.280462698Z E0319 11:55:19.280383 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/leader-election-rolebinding.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings/system:openshift:leader-locking-kube-scheduler\": context canceled, \"assets/kube-scheduler/scheduler-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/policyconfigmap-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/policyconfigmap-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:19.280481599Z I0319 11:55:19.280468 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-19T11:55:19.280490419Z I0319 11:55:19.280484 1 base_controller.go:113] All Installer workers have been terminated 2026-03-19T11:55:19.280497179Z I0319 11:55:19.280492 1 controller_manager.go:54] Installer controller terminated 2026-03-19T11:55:19.280519950Z I0319 11:55:19.280502 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-19T11:55:19.280528910Z I0319 11:55:19.280523 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-19T11:55:19.280535610Z I0319 11:55:19.280529 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-19T11:55:19.280624983Z I0319 11:55:19.280600 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-19T11:55:19.280634223Z I0319 11:55:19.280627 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-19T11:55:19.280646014Z I0319 11:55:19.280634 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-19T11:55:19.281730898Z I0319 11:55:19.281707 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-19T11:55:19.281745999Z I0319 11:55:19.281733 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-19T11:55:24.276695410Z I0319 11:55:24.276578 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:55:53.361440131Z E0319 11:55:53.361274 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:53.361518533Z W0319 11:55:53.361444 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-ptqdh.json0000640000000000000000000001365315156762311032173 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-dddff6458-ptqdh","generateName":"openshift-kube-scheduler-operator-dddff6458-","namespace":"openshift-kube-scheduler-operator","uid":"06df1b1b-154e-46f9-aee0-79a137c6c928","resourceVersion":"9590","creationTimestamp":"2026-03-19T11:51:45Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"dddff6458"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-dddff6458","uid":"e04d342d-a1b6-48d9-81b7-5104cdc23179","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:49Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-03-19T11:53:37Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:48Z","finishedAt":"2026-03-19T11:55:54Z","containerID":"cri-o://136228bc884d9d84e6c34125e85b6f53a4eb9c869542bab1b85def5ce8ff08ff"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://c3e2ad91bdcbc1b884a26e458f31fc9db94f1554ee950465422acf56a15740da","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-3-master-0/installer_current.log0000640000000000000000000001275415156762311027177 0ustar00000000000000002026-03-19T11:54:42.207894805Z I0319 11:54:42.205005 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000bd4000 cert-secrets:0xc000b9dcc0 configmaps:0xc000b9d860 namespace:0xc000b9d680 optional-configmaps:0xc000b9d9a0 optional-secrets:0xc000b9d900 pod:0xc000b9d720 pod-manifest-dir:0xc000b9dae0 resource-dir:0xc000b9da40 revision:0xc000b9d5e0 secrets:0xc000b9d7c0 v:0xc000bd4a00] [0xc000bd4a00 0xc000b9d5e0 0xc000b9d680 0xc000b9d720 0xc000b9da40 0xc000b9dae0 0xc000b9d860 0xc000b9d9a0 0xc000b9d900 0xc000b9d7c0 0xc000bd4000 0xc000b9dcc0] [] map[cert-configmaps:0xc000b9dd60 cert-dir:0xc000bd4000 cert-secrets:0xc000b9dcc0 configmaps:0xc000b9d860 help:0xc000bd4dc0 kubeconfig:0xc000b9d540 log-flush-frequency:0xc000bd4960 namespace:0xc000b9d680 optional-cert-configmaps:0xc000b9dea0 optional-cert-secrets:0xc000b9de00 optional-configmaps:0xc000b9d9a0 optional-secrets:0xc000b9d900 pod:0xc000b9d720 pod-manifest-dir:0xc000b9dae0 pod-manifests-lock-file:0xc000b9dc20 resource-dir:0xc000b9da40 revision:0xc000b9d5e0 secrets:0xc000b9d7c0 timeout-duration:0xc000b9db80 v:0xc000bd4a00 vmodule:0xc000bd4aa0] [0xc000b9d540 0xc000b9d5e0 0xc000b9d680 0xc000b9d720 0xc000b9d7c0 0xc000b9d860 0xc000b9d900 0xc000b9d9a0 0xc000b9da40 0xc000b9dae0 0xc000b9db80 0xc000b9dc20 0xc000b9dcc0 0xc000b9dd60 0xc000b9de00 0xc000b9dea0 0xc000bd4000 0xc000bd4960 0xc000bd4a00 0xc000bd4aa0 0xc000bd4dc0] [0xc000b9dd60 0xc000bd4000 0xc000b9dcc0 0xc000b9d860 0xc000bd4dc0 0xc000b9d540 0xc000bd4960 0xc000b9d680 0xc000b9dea0 0xc000b9de00 0xc000b9d9a0 0xc000b9d900 0xc000b9d720 0xc000b9dae0 0xc000b9dc20 0xc000b9da40 0xc000b9d5e0 0xc000b9d7c0 0xc000b9db80 0xc000bd4a00 0xc000bd4aa0] map[104:0xc000bd4dc0 118:0xc000bd4a00] [] -1 0 0xc000ba4f60 true 0x223dac0 []} 2026-03-19T11:54:42.207894805Z I0319 11:54:42.205272 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000bc81a0)({ 2026-03-19T11:54:42.207894805Z KubeConfig: (string) "", 2026-03-19T11:54:42.207894805Z KubeClient: (kubernetes.Interface) , 2026-03-19T11:54:42.207894805Z Revision: (string) (len=1) "3", 2026-03-19T11:54:42.207894805Z NodeName: (string) "", 2026-03-19T11:54:42.207894805Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-19T11:54:42.207894805Z Clock: (clock.RealClock) { 2026-03-19T11:54:42.207894805Z }, 2026-03-19T11:54:42.207894805Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-19T11:54:42.207894805Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:42.207894805Z (string) (len=31) "localhost-recovery-client-token" 2026-03-19T11:54:42.207894805Z }, 2026-03-19T11:54:42.207894805Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:42.207894805Z (string) (len=12) "serving-cert" 2026-03-19T11:54:42.207894805Z }, 2026-03-19T11:54:42.207894805Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-19T11:54:42.207894805Z (string) (len=18) "kube-scheduler-pod", 2026-03-19T11:54:42.207894805Z (string) (len=6) "config", 2026-03-19T11:54:42.207894805Z (string) (len=17) "serviceaccount-ca", 2026-03-19T11:54:42.207894805Z (string) (len=20) "scheduler-kubeconfig", 2026-03-19T11:54:42.207894805Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-19T11:54:42.207894805Z }, 2026-03-19T11:54:42.207894805Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:42.207894805Z (string) (len=16) "policy-configmap" 2026-03-19T11:54:42.207894805Z }, 2026-03-19T11:54:42.207894805Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-19T11:54:42.207894805Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-19T11:54:42.207894805Z }, 2026-03-19T11:54:42.207894805Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-19T11:54:42.207894805Z CertConfigMapNamePrefixes: ([]string) , 2026-03-19T11:54:42.207894805Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-19T11:54:42.207894805Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-19T11:54:42.207894805Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-19T11:54:42.207894805Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-19T11:54:42.207894805Z Timeout: (time.Duration) 2m0s, 2026-03-19T11:54:42.207894805Z StaticPodManifestsLockFile: (string) "", 2026-03-19T11:54:42.207894805Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-19T11:54:42.207894805Z KubeletVersion: (string) "" 2026-03-19T11:54:42.207894805Z }) 2026-03-19T11:54:42.214990268Z I0319 11:54:42.211925 1 cmd.go:413] Getting controller reference for node master-0 2026-03-19T11:54:42.240907720Z I0319 11:54:42.236245 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-19T11:54:42.240907720Z I0319 11:54:42.236307 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:54:42.240907720Z I0319 11:54:42.236317 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:54:42.282976407Z I0319 11:54:42.280405 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-19T11:55:12.280988945Z I0319 11:55:12.280732 1 cmd.go:524] Getting installer pods for node master-0 2026-03-19T11:55:26.285322151Z F0319 11:55:26.285218 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-scheduler/installer-3-master-0.json0000640000000000000000000001643015156762311022657 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-scheduler","uid":"4b49f09f-2efa-4657-9f5a-fbddd42bee0d","resourceVersion":"9532","creationTimestamp":"2026-03-19T11:54:32Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.48/23\"],\"mac_address\":\"0a:58:0a:80:00:30\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.48/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.48\"\n ],\n \"mac\": \"0a:58:0a:80:00:30\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"d4dafb5f-5c3d-44d5-ae7f-8841a4c38c03"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:32Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:00Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:00Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:32Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.48","podIPs":[{"ip":"10.128.0.48"}],"startTime":"2026-03-19T11:54:32Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"s: ([]string) (len=1 cap=1) {\n (string) (len=31) \"localhost-recovery-client-token\"\n },\n OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"serving-cert\"\n },\n ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\n (string) (len=18) \"kube-scheduler-pod\",\n (string) (len=6) \"config\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=20) \"scheduler-kubeconfig\",\n (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=16) \"policy-configmap\"\n },\n CertSecretNames: ([]string) (len=1 cap=1) {\n (string) (len=30) \"kube-scheduler-client-cert-key\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0319 11:54:42.211925 1 cmd.go:413] Getting controller reference for node master-0\nI0319 11:54:42.236245 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0319 11:54:42.236307 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:54:42.236317 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:54:42.280405 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0319 11:55:12.280732 1 cmd.go:524] Getting installer pods for node master-0\nF0319 11:55:26.285218 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-19T11:54:41Z","finishedAt":"2026-03-19T11:55:26Z","containerID":"cri-o://1f0110e6404807316fe552282de736e25a5c73a98ca28c762d1ca02e35c0a306"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://1f0110e6404807316fe552282de736e25a5c73a98ca28c762d1ca02e35c0a306","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000003624215156762311030233 0ustar00000000000000002026-03-19T11:56:24.359000874Z weight: 0 2026-03-19T11:56:24.359000874Z - name: NodeName 2026-03-19T11:56:24.359000874Z weight: 0 2026-03-19T11:56:24.359000874Z - name: TaintToleration 2026-03-19T11:56:24.359000874Z weight: 3 2026-03-19T11:56:24.359000874Z - name: NodeAffinity 2026-03-19T11:56:24.359000874Z weight: 2 2026-03-19T11:56:24.359000874Z - name: NodePorts 2026-03-19T11:56:24.359000874Z weight: 0 2026-03-19T11:56:24.359000874Z - name: NodeResourcesFit 2026-03-19T11:56:24.359000874Z weight: 1 2026-03-19T11:56:24.359000874Z - name: VolumeRestrictions 2026-03-19T11:56:24.359000874Z weight: 0 2026-03-19T11:56:24.359000874Z - name: NodeVolumeLimits 2026-03-19T11:56:24.359000874Z weight: 0 2026-03-19T11:56:24.359000874Z - name: VolumeBinding 2026-03-19T11:56:24.359000874Z weight: 0 2026-03-19T11:56:24.359000874Z - name: VolumeZone 2026-03-19T11:56:24.359000874Z weight: 0 2026-03-19T11:56:24.359000874Z - name: PodTopologySpread 2026-03-19T11:56:24.359000874Z weight: 2 2026-03-19T11:56:24.359000874Z - name: InterPodAffinity 2026-03-19T11:56:24.359000874Z weight: 2 2026-03-19T11:56:24.359000874Z - name: DefaultPreemption 2026-03-19T11:56:24.359000874Z weight: 0 2026-03-19T11:56:24.359000874Z - name: NodeResourcesBalancedAllocation 2026-03-19T11:56:24.359000874Z weight: 1 2026-03-19T11:56:24.359000874Z - name: ImageLocality 2026-03-19T11:56:24.359000874Z weight: 1 2026-03-19T11:56:24.359000874Z - name: DefaultBinder 2026-03-19T11:56:24.359000874Z weight: 0 2026-03-19T11:56:24.359000874Z permit: {} 2026-03-19T11:56:24.359000874Z postBind: {} 2026-03-19T11:56:24.359000874Z postFilter: {} 2026-03-19T11:56:24.359000874Z preBind: {} 2026-03-19T11:56:24.359000874Z preEnqueue: {} 2026-03-19T11:56:24.359000874Z preFilter: {} 2026-03-19T11:56:24.359000874Z preScore: {} 2026-03-19T11:56:24.359000874Z queueSort: {} 2026-03-19T11:56:24.359000874Z reserve: {} 2026-03-19T11:56:24.359000874Z score: {} 2026-03-19T11:56:24.359000874Z schedulerName: default-scheduler 2026-03-19T11:56:24.359000874Z > 2026-03-19T11:56:24.363121864Z I0319 11:56:24.362926 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-19T11:56:24.363121864Z I0319 11:56:24.362999 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-19T11:56:24.365971714Z I0319 11:56:24.365095 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:56:24.365971714Z I0319 11:56:24.365238 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:24.365971714Z I0319 11:56:24.365438 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-19T11:56:24.365971714Z I0319 11:56:24.365482 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773921323\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773921323\" (2026-03-19 10:55:23 +0000 UTC to 2027-03-19 10:55:23 +0000 UTC (now=2026-03-19 11:56:24.365447838 +0000 UTC))" 2026-03-19T11:56:24.365971714Z I0319 11:56:24.365651 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921324\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921324\" (2026-03-19 10:55:23 +0000 UTC to 2029-03-19 10:55:23 +0000 UTC (now=2026-03-19 11:56:24.365640234 +0000 UTC))" 2026-03-19T11:56:24.365971714Z I0319 11:56:24.365721 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-19T11:56:24.365971714Z I0319 11:56:24.365766 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:56:24.369409703Z I0319 11:56:24.369366 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.369659260Z I0319 11:56:24.369636 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.370303551Z I0319 11:56:24.370276 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.370457416Z I0319 11:56:24.370406 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.370504817Z I0319 11:56:24.370483 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.370716894Z I0319 11:56:24.370694 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.371493509Z I0319 11:56:24.371449 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.373966667Z I0319 11:56:24.371947 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.373966667Z I0319 11:56:24.372029 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-19T11:56:24.373966667Z I0319 11:56:24.372187 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.373966667Z I0319 11:56:24.372196 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.373966667Z I0319 11:56:24.372383 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-19T11:56:24.373966667Z I0319 11:56:24.372415 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.385061007Z I0319 11:56:24.384972 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.386792191Z I0319 11:56:24.386747 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.396444827Z I0319 11:56:24.394651 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.400750772Z I0319 11:56:24.400684 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-19T11:56:24.466204969Z I0319 11:56:24.466098 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:24.466204969Z I0319 11:56:24.466148 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-19T11:56:24.466615402Z I0319 11:56:24.466558 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:36:28 +0000 UTC to 2036-03-16 11:36:28 +0000 UTC (now=2026-03-19 11:56:24.466521759 +0000 UTC))" 2026-03-19T11:56:24.466656314Z I0319 11:56:24.466612 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:21 +0000 UTC to 2026-03-20 11:43:21 +0000 UTC (now=2026-03-19 11:56:24.466596482 +0000 UTC))" 2026-03-19T11:56:24.466656314Z I0319 11:56:24.466643 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-19 11:43:21 +0000 UTC to 2027-03-19 11:43:21 +0000 UTC (now=2026-03-19 11:56:24.466637293 +0000 UTC))" 2026-03-19T11:56:24.466687095Z I0319 11:56:24.466658 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:21 +0000 UTC to 2027-03-19 11:43:21 +0000 UTC (now=2026-03-19 11:56:24.466653194 +0000 UTC))" 2026-03-19T11:56:24.466687095Z I0319 11:56:24.466678 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:43:19 +0000 UTC to 2036-03-16 11:43:19 +0000 UTC (now=2026-03-19 11:56:24.466672664 +0000 UTC))" 2026-03-19T11:56:24.466983994Z I0319 11:56:24.466931 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773921323\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773921323\" (2026-03-19 10:55:23 +0000 UTC to 2027-03-19 10:55:23 +0000 UTC (now=2026-03-19 11:56:24.466919532 +0000 UTC))" 2026-03-19T11:56:24.467170300Z I0319 11:56:24.467118 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921324\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921324\" (2026-03-19 10:55:23 +0000 UTC to 2029-03-19 10:55:23 +0000 UTC (now=2026-03-19 11:56:24.467108088 +0000 UTC))" 2026-03-19T11:56:29.467171438Z E0319 11:56:29.467037 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:37.620295158Z E0319 11:56:37.620115 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:44.870871150Z E0319 11:56:44.870768 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:52.785341125Z E0319 11:56:52.785268 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:57:16.222275591Z I0319 11:57:16.222177 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-19T11:57:16.231625206Z I0319 11:57:16.230056 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-fbd5s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:16.238150002Z I0319 11:57:16.237784 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-s22fd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:16.238150002Z I0319 11:57:16.237865 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-tdnkp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:18.456643613Z I0319 11:57:18.455141 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-68bf6ff9d6-djdmh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:18.471197442Z I0319 11:57:18.470466 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-nr2k4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:18.471197442Z I0319 11:57:18.470989 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-cx8l9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:18.559909633Z I0319 11:57:18.559106 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-tql86" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:18.559909633Z I0319 11:57:18.559410 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-5c6485487f-qv29l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:18.577940752Z I0319 11:57:18.576300 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-866dc4744-fblgs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:18.577940752Z I0319 11:57:18.576606 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-6j2q4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:18.577940752Z I0319 11:57:18.577066 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-6fbb6cf6f9-75w5c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:19.263853940Z I0319 11:57:19.260640 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-6c8df6d4b-qsrjj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:42.088845664Z I0319 11:57:42.081388 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856-84gh4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:42.617210078Z I0319 11:57:42.617139 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/node-exporter-lpndz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:42.617561028Z I0319 11:57:42.617490 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/openshift-state-metrics-5dc6c74576-k464h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:42.699505206Z I0319 11:57:42.699257 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/kube-state-metrics-7bbc969446-bnf7q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:57:49.650676824Z I0319 11:57:49.650577 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/metrics-server-86889676f6-phlgd" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006470115156762311030426 0ustar00000000000000002026-03-19T11:51:45.502252155Z I0319 11:51:45.502171 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-ptqdh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:45.608928584Z I0319 11:51:45.608852 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-nhvl4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:45.704033780Z I0319 11:51:45.703916 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-6bb5bfb6fd-s4qsk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:45.806480846Z I0319 11:51:45.806114 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:45.901539720Z I0319 11:51:45.901480 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-fjn4b" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:46.003866501Z I0319 11:51:46.003611 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-92c5d" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:46.105200343Z I0319 11:51:46.105117 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-66b84d69b-btppx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:46.202328111Z I0319 11:51:46.202247 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-89ccd998f-pr7gk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:46.310110395Z I0319 11:51:46.309997 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7bd846bfc4-nb8bk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:51:46.405304823Z I0319 11:51:46.405181 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-lswqw" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:46.509935817Z I0319 11:51:46.509750 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-2trz4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:51:48.293171084Z I0319 11:51:48.293055 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-b6qm2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:26.417043333Z I0319 11:52:26.416975 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-8ndtd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:36.315049958Z I0319 11:52:36.314937 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-w82cg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:36.515342105Z I0319 11:52:36.515155 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-2z4h8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:37.296499166Z I0319 11:52:37.296324 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-6t6sn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:39.297208049Z I0319 11:52:39.297119 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-fz8cg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:52:48.711138426Z I0319 11:52:48.710508 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-57f769d897-f6m2t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:48.958689237Z I0319 11:52:48.958618 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-dfq9s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:50.897931550Z I0319 11:52:50.897762 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-6dmt7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:52:51.892032365Z I0319 11:52:51.891962 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-v66z4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:52:56.107665305Z I0319 11:52:56.107598 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-wd4nx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:16.021402869Z I0319 11:53:16.021298 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-lk9x9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.539115847Z I0319 11:53:37.539017 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-mjs7x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.539520180Z I0319 11:53:37.539485 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-92c5d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.539589282Z I0319 11:53:37.539563 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-cg9pq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.539716496Z I0319 11:53:37.539692 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-6j2nj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.539775768Z I0319 11:53:37.539754 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-5c9796789-8cldl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.539865261Z I0319 11:53:37.539841 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-b865698dc-sxsxt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.539923513Z I0319 11:53:37.539900 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-pkgvq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.540016946Z I0319 11:53:37.539987 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-qv4cg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.540705287Z I0319 11:53:37.540063 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.540986856Z I0319 11:53:37.540954 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-zfsqt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.541114680Z I0319 11:53:37.541068 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6-6wzws" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.541114680Z I0319 11:53:37.541099 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-9c5679d8f-z6kvm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.545847078Z I0319 11:53:37.544234 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-6bb5bfb6fd-s4qsk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.545847078Z I0319 11:53:37.544296 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-sc4kz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.547567812Z I0319 11:53:37.547533 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5f5d689c6b-2chdm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.547728507Z I0319 11:53:37.547702 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-89ccd998f-pr7gk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.547764578Z I0319 11:53:37.547745 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-lswqw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.547822540Z I0319 11:53:37.547784 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-fz8cg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.547868061Z I0319 11:53:37.547844 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-2trz4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.547906683Z I0319 11:53:37.547886 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-5549dc66cb-g6sn6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.547946504Z I0319 11:53:37.547925 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-ptqdh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.548551233Z I0319 11:53:37.547963 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-nhvl4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.548551233Z I0319 11:53:37.547999 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-fjn4b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.548551233Z I0319 11:53:37.548032 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-66b84d69b-btppx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:37.559513366Z I0319 11:53:37.559419 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-gx4w8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:38.285245516Z I0319 11:53:38.285156 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-276t5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:49.578531063Z I0319 11:53:49.578188 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-6m654" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:49.678847976Z I0319 11:53:49.668497 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-8487694857-99fgs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:51.206885824Z I0319 11:53:51.206372 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-f5df8899c-dc825" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:52.274455599Z I0319 11:53:52.274261 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-5d6d7c9966-r7q9d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:53:52.294182067Z I0319 11:53:52.294115 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6f4c566c59-qckt8" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:54.083959484Z I0319 11:53:54.083880 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6484d6777d-wmpqv" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:53:55.376216478Z I0319 11:53:55.376143 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6484d6777d-wmpqv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:01.503822856Z I0319 11:54:01.501859 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-79bc6b8d76-5rbp5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:09.360841645Z I0319 11:54:09.358833 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-594b8bbb67-8fxxb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:17.701058500Z I0319 11:54:17.701000 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-fdc5db968-8zh6r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:17.843329076Z I0319 11:54:17.839822 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-9mpxd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:17.864827830Z I0319 11:54:17.863522 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-j2w8z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:18.142604519Z I0319 11:54:18.142551 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-897cc986b-vpg2l" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:18.199828762Z I0319 11:54:18.199765 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-54b4cfc58b-pjsj5" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:18.272826278Z I0319 11:54:18.272753 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-7f9d586bf8-khff4" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:19.784273886Z I0319 11:54:19.784220 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-897cc986b-vpg2l" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:19.784698320Z I0319 11:54:19.784680 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-7f9d586bf8-khff4" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:19.794045763Z I0319 11:54:19.793779 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-54b4cfc58b-pjsj5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:21.269409321Z I0319 11:54:21.269355 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-dc5br" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:21.860100342Z I0319 11:54:21.860026 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-897cc986b-vpg2l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:21.861135094Z I0319 11:54:21.861090 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-7f9d586bf8-khff4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:22.377264494Z I0319 11:54:22.377200 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-zjdkm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:23.257165538Z I0319 11:54:23.255974 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-jqzxt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:28.637822691Z I0319 11:54:28.636969 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-ms2wn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:30.759258603Z I0319 11:54:30.759178 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7cdddc6cb-q222c" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:30.858587143Z I0319 11:54:30.858540 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-fdb67f9cf-vkmd9" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:35.954532369Z I0319 11:54:35.954468 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7cdddc6cb-q222c" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:35.955020885Z I0319 11:54:35.954903 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-fdb67f9cf-vkmd9" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:40.385740395Z I0319 11:54:40.385665 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7cdddc6cb-q222c" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:40.387044207Z I0319 11:54:40.386068 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-fdb67f9cf-vkmd9" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-19T11:54:41.635264661Z I0319 11:54:41.635193 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-7d58488df-czxxt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:42.153572484Z I0319 11:54:42.153091 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-z8xf6" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:54:42.475937681Z I0319 11:54:42.473485 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-kj4wv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:42.651619753Z I0319 11:54:42.651281 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-lkpgl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-19T11:54:42.805103920Z I0319 11:54:42.803621 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-p225c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:44.008812100Z I0319 11:54:44.006627 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-flnbx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:44.297497222Z I0319 11:54:44.297302 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-77d68bd5f8-w9hmb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:44.888669648Z I0319 11:54:44.888450 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7cdddc6cb-q222c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:44.889438022Z I0319 11:54:44.888963 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-fdb67f9cf-vkmd9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:45.211143558Z I0319 11:54:45.210908 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-bkx8c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:45.913550087Z I0319 11:54:45.913469 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-b4f87c5b9-rdpvm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:47.254293030Z I0319 11:54:47.251507 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-z8xf6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:47.257863502Z I0319 11:54:47.256294 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-7dcf5569b5-lkpgl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:47.257863502Z I0319 11:54:47.256395 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-6dmt7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:50.372039897Z I0319 11:54:50.370475 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-g7mqg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:54:54.824415284Z I0319 11:54:54.824000 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-cjgpg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-19T11:55:00.974884478Z E0319 11:55:00.974769 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-19T11:55:05.975361579Z E0319 11:55:05.975282 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:55:05.975361579Z I0319 11:55:05.975334 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-19T11:55:10.976843989Z E0319 11:55:10.976392 1 leaderelection.go:322] Failed to release lock: the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io kube-scheduler) 2026-03-19T11:55:10.976843989Z E0319 11:55:10.976441 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515156762311023013 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"4e2413c2-0b83-4447-bc8d-a25d315a238a","resourceVersion":"9470","creationTimestamp":"2026-03-19T11:52:28Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.mirror":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.seen":"2026-03-19T11:51:09.971905760Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"538ea3c1-a257-4167-908a-2357320442cc","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:55:23Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:55:23Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:53:50Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-19T11:55:23Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-19T11:51:20Z","finishedAt":"2026-03-19T11:55:11Z","containerID":"cri-o://6606dc49963e1cc0f10c3000efffd7cbb91c76beb712be6d1c6cb91c1b4a7c79"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","containerID":"cri-o://5ae4788fe8a4fbccec56e9e4515eedb286ece7ed48749691d96f6fb8097bac2c","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000007474215156762311034235 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-19T11:51:32.258897674Z I0319 11:51:32.258703 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:51:32.452428267Z I0319 11:51:32.452359 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:51:32.504765552Z I0319 11:51:32.504688 1 reconciliation_controller.go:149] Caches are synced 2026-03-19T11:51:32.538663685Z I0319 11:51:32.538596 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-19T11:51:35.675339519Z W0319 11:51:35.675195 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:51:35.675339519Z E0319 11:51:35.675266 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:51:44.561591525Z W0319 11:51:44.561523 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:51:44.561591525Z E0319 11:51:44.561577 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:52:03.669947962Z W0319 11:52:03.669856 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:52:03.669947962Z E0319 11:52:03.669931 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:52:24.115965448Z E0319 11:52:24.115726 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: 3e6bae60-e498-4a25-a548-28d332639cc1, UID in object meta: , falling back to slow path 2026-03-19T11:52:33.557444414Z I0319 11:52:33.557319 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-03-19T11:52:34.467959326Z I0319 11:52:34.467841 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-19T11:52:34.671481695Z I0319 11:52:34.671365 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-03-19T11:52:40.280035161Z I0319 11:52:40.279927 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-03-19T11:52:48.279817587Z I0319 11:52:48.279728 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-03-19T11:52:49.476837872Z I0319 11:52:49.476733 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-03-19T11:52:52.684965786Z I0319 11:52:52.684885 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-03-19T11:52:53.067982849Z I0319 11:52:53.067920 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-03-19T11:52:53.422854057Z W0319 11:52:53.422778 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:52:53.422901039Z E0319 11:52:53.422864 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:52:53.465456345Z I0319 11:52:53.465402 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-03-19T11:53:02.568675079Z I0319 11:53:02.568619 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-03-19T11:53:02.568812234Z I0319 11:53:02.568763 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-03-19T11:53:02.568867616Z I0319 11:53:02.568846 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-03-19T11:53:02.568899057Z I0319 11:53:02.568883 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-03-19T11:53:02.568936448Z I0319 11:53:02.568922 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-03-19T11:53:02.568965429Z I0319 11:53:02.568953 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-03-19T11:53:02.569012770Z I0319 11:53:02.568991 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-03-19T11:53:02.569037151Z I0319 11:53:02.569021 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-03-19T11:53:02.569069172Z I0319 11:53:02.569055 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-03-19T11:53:02.569131914Z I0319 11:53:02.569110 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-03-19T11:53:02.571937362Z I0319 11:53:02.571783 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:02.571937362Z I0319 11:53:02.571869 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:02.571998564Z I0319 11:53:02.571935 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:02.572029565Z I0319 11:53:02.572007 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:02.572084187Z I0319 11:53:02.572047 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:02.572142629Z I0319 11:53:02.572113 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:02.572223941Z I0319 11:53:02.572186 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:02.572223941Z I0319 11:53:02.571783 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:02.638967326Z I0319 11:53:02.638886 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:53:02.671159207Z I0319 11:53:02.671075 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-19T11:53:30.129876123Z W0319 11:53:30.128596 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:53:30.129876123Z E0319 11:53:30.128662 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:53:49.513372503Z I0319 11:53:49.513303 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-03-19T11:53:50.446839899Z I0319 11:53:50.446754 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-03-19T11:53:50.606924863Z I0319 11:53:50.606831 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-03-19T11:53:57.169374839Z I0319 11:53:57.169308 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-03-19T11:54:00.622968779Z I0319 11:53:59.840403 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-03-19T11:54:01.771000122Z I0319 11:54:01.770549 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-03-19T11:54:02.687305770Z I0319 11:54:02.687221 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-03-19T11:54:02.687441374Z I0319 11:54:02.687403 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-03-19T11:54:02.689336763Z I0319 11:54:02.689307 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:54:02.797848973Z I0319 11:54:02.794193 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-19T11:54:03.309711554Z I0319 11:54:03.309651 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-03-19T11:54:04.026229776Z I0319 11:54:04.026184 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-03-19T11:54:04.062527452Z I0319 11:54:04.060464 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-03-19T11:54:06.465835823Z I0319 11:54:06.465690 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-19T11:54:07.564608447Z I0319 11:54:07.564493 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-03-19T11:54:17.771305380Z W0319 11:54:17.770489 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:54:17.771305380Z E0319 11:54:17.770548 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:54:21.510574654Z I0319 11:54:21.510514 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-03-19T11:54:32.640262726Z I0319 11:54:32.640194 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-19T11:54:41.319592544Z I0319 11:54:41.319519 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-2nvkf" has been approved 2026-03-19T11:54:41.486148760Z I0319 11:54:41.486091 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-d7rd5" has been approved 2026-03-19T11:54:42.487148812Z I0319 11:54:42.487053 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-03-19T11:54:44.430632001Z I0319 11:54:44.427151 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:image-puller" not found 2026-03-19T11:54:47.644177481Z I0319 11:54:47.644107 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-03-19T11:54:47.711956063Z I0319 11:54:47.711897 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-03-19T11:55:02.810616223Z I0319 11:55:02.810470 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:55:02.810616223Z E0319 11:55:02.810570 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:55:15.179991461Z W0319 11:55:15.179890 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:55:15.179991461Z E0319 11:55:15.179960 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:55:32.818478510Z I0319 11:55:32.818391 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:55:32.818478510Z E0319 11:55:32.818454 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:55:58.142071133Z E0319 11:55:58.141992 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-19T11:56:02.827346823Z I0319 11:56:02.827234 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:56:02.827346823Z E0319 11:56:02.827323 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:56:03.922362059Z W0319 11:56:03.922254 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:56:03.922362059Z E0319 11:56:03.922328 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:56:32.835035721Z I0319 11:56:32.834931 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:56:32.835035721Z E0319 11:56:32.835010 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:56:47.794135225Z I0319 11:56:47.794084 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-19T11:56:49.660404374Z I0319 11:56:49.660122 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cluster-cloud-controller-manager" not found 2026-03-19T11:56:50.820769103Z I0319 11:56:50.820701 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "cluster-autoscaler" not found 2026-03-19T11:56:50.966048640Z I0319 11:56:50.964408 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-03-19T11:56:51.072092218Z I0319 11:56:51.072006 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-19T11:56:51.415877064Z I0319 11:56:51.414441 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-03-19T11:56:53.135482981Z I0319 11:56:53.135122 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s" not found 2026-03-19T11:56:56.855900636Z I0319 11:56:56.855762 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-03-19T11:56:58.143972708Z E0319 11:56:58.143906 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-policy-controller-lock) 2026-03-19T11:56:59.785743388Z I0319 11:56:59.784547 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found 2026-03-19T11:57:02.847917988Z I0319 11:57:02.847435 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:57:02.847917988Z E0319 11:57:02.847515 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:57:03.451734624Z W0319 11:57:03.451670 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:57:03.451734624Z E0319 11:57:03.451721 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-19T11:57:32.858368386Z I0319 11:57:32.858245 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-19T11:57:32.858368386Z E0319 11:57:32.858354 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-03-19T11:57:39.227688471Z W0319 11:57:39.227566 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-19T11:57:39.227688471Z E0319 11:57:39.227626 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" kube-controller-manager_current.log0000640000000000000000000007303015156762311033602 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-19T11:57:20.480747325Z I0319 11:57:20.480643 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRole, namespace: , name: cluster-node-tuning:tuned, uid: e2bfca11-5485-4296-801c-64af4336e229]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}] 2026-03-19T11:57:20.488286773Z I0319 11:57:20.488196 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/Service, namespace: openshift-operator-lifecycle-manager, name: packageserver-service, uid: eda0d031-5ee8-440f-9990-4d3c8a1e1f5a]" owner=[{"apiVersion":"operators.coreos.com/v1alpha1","kind":"ClusterServiceVersion","name":"packageserver","uid":"4cac6d0a-f841-4e16-86e4-ce1a98ca913a","controller":false,"blockOwnerDeletion":false}] 2026-03-19T11:57:20.490087010Z I0319 11:57:20.490016 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/Service, namespace: openshift-marketplace, name: redhat-operators, uid: 259d6f8d-e8a2-4ba8-bbee-d277ad6c7a26]" owner=[{"apiVersion":"operators.coreos.com/v1alpha1","kind":"CatalogSource","name":"redhat-operators","uid":"9631ba27-3758-4484-bb79-d8043782fd15","controller":false,"blockOwnerDeletion":false}] 2026-03-19T11:57:20.493398444Z I0319 11:57:20.493355 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[machineconfiguration.openshift.io/v1/ControllerConfig, namespace: , name: machine-config-controller, uid: b75867df-568d-4d6c-8428-62def77c0669]" 2026-03-19T11:57:20.504093382Z I0319 11:57:20.503988 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/RoleBinding, namespace: openshift-config, name: insights-operator, uid: 2c8121c5-175e-48e1-bf32-c4b7e081aeb1]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}] 2026-03-19T11:57:20.506708354Z I0319 11:57:20.506655 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/RoleBinding, namespace: openshift-insights, name: prometheus-k8s, uid: ee02f6c0-2c3d-43c5-ad23-54149e964270]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}] 2026-03-19T11:57:20.509535194Z I0319 11:57:20.509492 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[machineconfiguration.openshift.io/v1/MachineConfigPool, namespace: , name: worker, uid: 6721bcb7-15e7-4a19-bbd9-c6707feda6e4]" 2026-03-19T11:57:20.513367395Z I0319 11:57:20.513315 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/RoleBinding, namespace: openshift-marketplace, name: openshift-marketplace-metrics, uid: 20c8f198-a019-4438-aa35-8f7df6590e83]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}] 2026-03-19T11:57:20.516819224Z I0319 11:57:20.516764 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/RoleBinding, namespace: openshift-cloud-controller-manager, name: cloud-controller-manager, uid: 38dccb77-db18-41e7-8a41-284c3bfaff4f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}] 2026-03-19T11:57:20.519239900Z I0319 11:57:20.519174 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/RoleBinding, namespace: openshift-config, name: cluster-cloud-controller-manager, uid: 8c4f14a3-da23-480a-83e9-e2a318615a1d]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}] 2026-03-19T11:57:20.522669579Z I0319 11:57:20.522630 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-apiserver, name: revision-status-1, uid: 4f38f0ca-460e-4cf3-b767-c38a56f32044]" 2026-03-19T11:57:20.526420157Z I0319 11:57:20.526380 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-kube-controller-manager, name: revision-status-3, uid: 2fc625d3-864b-4402-bc47-848defb95cce]" 2026-03-19T11:57:20.530336651Z I0319 11:57:20.530255 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: e0261926-9651-4115-bb1c-ee783172e2a7]" 2026-03-19T11:57:20.533539172Z I0319 11:57:20.533493 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/Service, namespace: openshift-network-diagnostics, name: network-check-target, uid: f59a86da-d5f1-4dd9-8db9-2672c828f60d]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"4967de4b-de62-413f-8d66-6ab62f71fcb2","controller":true,"blockOwnerDeletion":true}] 2026-03-19T11:57:20.537007632Z I0319 11:57:20.536913 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[scheduling.k8s.io/v1/PriorityClass, namespace: , name: openshift-user-critical, uid: 34b215c6-9562-4ac3-8005-b65ec0668f3b]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}] 2026-03-19T11:57:20.538988344Z I0319 11:57:20.538917 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/Service, namespace: openshift-marketplace, name: certified-operators, uid: 2b4afe1a-1719-45a1-bb9f-7478f5593fdd]" owner=[{"apiVersion":"operators.coreos.com/v1alpha1","kind":"CatalogSource","name":"certified-operators","uid":"d48d734b-1078-4e85-a3d0-1ff30147ec6e","controller":false,"blockOwnerDeletion":false}] 2026-03-19T11:57:20.544025433Z I0319 11:57:20.543973 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/RoleBinding, namespace: openshift-network-node-identity, name: system:openshift:scc:hostnetwork-v2, uid: 7570ab48-6a9f-452c-89fc-fbb1401c2517]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"4967de4b-de62-413f-8d66-6ab62f71fcb2","controller":true,"blockOwnerDeletion":true}] 2026-03-19T11:57:20.546818901Z I0319 11:57:20.546714 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Image, namespace: , name: cluster, uid: fcfde781-dd6b-4096-8f08-f7da406803e1]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781"}] 2026-03-19T11:57:20.550876230Z I0319 11:57:20.550825 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[machineconfiguration.openshift.io/v1/MachineConfig, namespace: , name: rendered-master-fa3672be4c706f8280cf21480935ad94, uid: 6e679052-87bb-4c10-b568-35aababa78e1]" owner=[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","name":"master","uid":"cd97e8aa-e72f-4ffb-bd69-68d0b13412a7","controller":true,"blockOwnerDeletion":true}] 2026-03-19T11:57:20.605576736Z I0319 11:57:20.605489 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" need=0 deleting=1 2026-03-19T11:57:20.605638198Z I0319 11:57:20.605623 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" relatedReplicaSets=["openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c"] 2026-03-19T11:57:20.605695620Z I0319 11:57:20.605682 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="cluster-cloud-controller-manager-operator-7559f7c68c" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-6j2q4" 2026-03-19T11:57:20.627976424Z I0319 11:57:20.627901 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:20.628371836Z I0319 11:57:20.628296 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="22.839202ms" 2026-03-19T11:57:20.646764657Z I0319 11:57:20.646679 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="18.314517ms" 2026-03-19T11:57:20.647179360Z I0319 11:57:20.647128 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:20.647584433Z I0319 11:57:20.647540 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="85.783µs" 2026-03-19T11:57:20.664873099Z I0319 11:57:20.664786 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77" duration="47.962µs" 2026-03-19T11:57:20.684403316Z I0319 11:57:20.684308 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8" duration="71.122µs" 2026-03-19T11:57:20.701340621Z I0319 11:57:20.701270 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="59.082µs" 2026-03-19T11:57:20.720395122Z I0319 11:57:20.720331 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="61.212µs" 2026-03-19T11:57:20.740382503Z I0319 11:57:20.740324 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-866dc4744" duration="51.902µs" 2026-03-19T11:57:20.790074862Z I0319 11:57:20.789951 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="72.122µs" 2026-03-19T11:57:20.811693164Z I0319 11:57:20.811392 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78" duration="57.091µs" 2026-03-19T11:57:23.841305666Z I0319 11:57:23.841215 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8" duration="14.749165ms" 2026-03-19T11:57:23.841398679Z I0319 11:57:23.841374 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8" duration="104.503µs" 2026-03-19T11:57:40.738519547Z I0319 11:57:40.737362 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77" duration="15.674555ms" 2026-03-19T11:57:40.738519547Z I0319 11:57:40.737465 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77" duration="53.452µs" 2026-03-19T11:57:40.774538264Z I0319 11:57:40.774481 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="13.353281ms" 2026-03-19T11:57:40.774664338Z I0319 11:57:40.774650 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="50.991µs" 2026-03-19T11:57:40.801088292Z I0319 11:57:40.800766 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="18.598897ms" 2026-03-19T11:57:40.801088292Z I0319 11:57:40.800843 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="36.531µs" 2026-03-19T11:57:40.843829722Z I0319 11:57:40.843297 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-866dc4744" duration="11.243545ms" 2026-03-19T11:57:40.843829722Z I0319 11:57:40.843553 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-866dc4744" duration="46.402µs" 2026-03-19T11:57:40.905704996Z I0319 11:57:40.905635 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="13.322741ms" 2026-03-19T11:57:40.905752117Z I0319 11:57:40.905739 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="70.063µs" 2026-03-19T11:57:40.949594301Z I0319 11:57:40.948288 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78" duration="15.237342ms" 2026-03-19T11:57:40.949594301Z I0319 11:57:40.948401 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78" duration="36.391µs" 2026-03-19T11:57:40.978839475Z I0319 11:57:40.978489 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="9.81359ms" 2026-03-19T11:57:40.978839475Z I0319 11:57:40.978761 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="60.272µs" 2026-03-19T11:57:41.015100660Z I0319 11:57:41.015017 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="45.241µs" 2026-03-19T11:57:41.157539957Z I0319 11:57:41.157468 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="46.532µs" 2026-03-19T11:57:42.043350888Z I0319 11:57:42.042500 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="37.521µs" 2026-03-19T11:57:42.047162608Z I0319 11:57:42.047074 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="84.552µs" 2026-03-19T11:57:42.057847405Z I0319 11:57:42.057732 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" need=1 creating=1 2026-03-19T11:57:42.073893572Z I0319 11:57:42.073772 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:42.084703383Z I0319 11:57:42.084619 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="26.91428ms" 2026-03-19T11:57:42.092223360Z I0319 11:57:42.092143 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="7.472586ms" 2026-03-19T11:57:42.092259372Z I0319 11:57:42.092233 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="39.141µs" 2026-03-19T11:57:42.113865114Z I0319 11:57:42.113756 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="44.992µs" 2026-03-19T11:57:42.588275014Z I0319 11:57:42.588193 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/openshift-state-metrics-5dc6c74576" need=1 creating=1 2026-03-19T11:57:42.610489855Z I0319 11:57:42.610411 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-5dc6c74576" duration="22.267143ms" 2026-03-19T11:57:42.619843541Z I0319 11:57:42.619283 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/openshift-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"openshift-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:42.632647525Z I0319 11:57:42.631760 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-5dc6c74576" duration="21.290222ms" 2026-03-19T11:57:42.645299375Z I0319 11:57:42.645228 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/openshift-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"openshift-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:42.656694384Z I0319 11:57:42.655506 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-5dc6c74576" duration="23.656267ms" 2026-03-19T11:57:42.656694384Z I0319 11:57:42.655684 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-5dc6c74576" duration="112.733µs" 2026-03-19T11:57:42.660381680Z I0319 11:57:42.660338 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-5dc6c74576" duration="39.252µs" 2026-03-19T11:57:42.670212291Z I0319 11:57:42.670154 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/kube-state-metrics-7bbc969446" need=1 creating=1 2026-03-19T11:57:42.674191036Z I0319 11:57:42.673819 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/openshift-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"openshift-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:42.701437227Z I0319 11:57:42.700369 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/kube-state-metrics" err="Operation cannot be fulfilled on deployments.apps \"kube-state-metrics\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:42.702231912Z I0319 11:57:42.702180 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7bbc969446" duration="32.055272ms" 2026-03-19T11:57:42.719921881Z I0319 11:57:42.719785 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7bbc969446" duration="17.560115ms" 2026-03-19T11:57:42.719921881Z I0319 11:57:42.719909 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7bbc969446" duration="68.342µs" 2026-03-19T11:57:42.722281165Z I0319 11:57:42.721039 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7bbc969446" duration="43.631µs" 2026-03-19T11:57:42.736932948Z I0319 11:57:42.735321 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7bbc969446" duration="73.862µs" 2026-03-19T11:57:43.947929486Z I0319 11:57:43.947337 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7bbc969446" duration="102.802µs" 2026-03-19T11:57:43.976127196Z I0319 11:57:43.975958 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-5dc6c74576" duration="100.473µs" 2026-03-19T11:57:44.051928060Z I0319 11:57:44.050185 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="90.113µs" 2026-03-19T11:57:44.084178899Z I0319 11:57:44.084096 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="13.885758ms" 2026-03-19T11:57:44.084782767Z I0319 11:57:44.084243 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="62.872µs" 2026-03-19T11:57:48.472418710Z I0319 11:57:48.472299 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-03-19T11:57:48.485084200Z E0319 11:57:48.484951 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-03-19T11:57:49.575336585Z I0319 11:57:49.575267 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/metrics-server-86889676f6" need=1 creating=1 2026-03-19T11:57:49.633992007Z I0319 11:57:49.633899 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/metrics-server" err="Operation cannot be fulfilled on deployments.apps \"metrics-server\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:49.655768575Z I0319 11:57:49.653992 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-86889676f6" duration="78.781417ms" 2026-03-19T11:57:49.662977093Z I0319 11:57:49.662900 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-86889676f6" duration="8.85826ms" 2026-03-19T11:57:49.663024544Z I0319 11:57:49.662981 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-86889676f6" duration="50.472µs" 2026-03-19T11:57:49.663290043Z I0319 11:57:49.663034 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/metrics-server" err="Operation cannot be fulfilled on deployments.apps \"metrics-server\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:49.675968003Z I0319 11:57:49.675375 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-86889676f6" duration="78.862µs" 2026-03-19T11:57:49.680761505Z I0319 11:57:49.680684 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/metrics-server" err="Operation cannot be fulfilled on deployments.apps \"metrics-server\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-19T11:57:49.692916208Z I0319 11:57:49.692767 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-86889676f6" duration="73.653µs" 2026-03-19T11:57:50.136776094Z I0319 11:57:50.136463 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7bbc969446" duration="10.230124ms" 2026-03-19T11:57:50.137024012Z I0319 11:57:50.136971 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7bbc969446" duration="95.273µs" 2026-03-19T11:57:50.593157504Z I0319 11:57:50.592538 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-86889676f6" duration="59.972µs" 2026-03-19T11:57:50.667993497Z I0319 11:57:50.667662 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-5dc6c74576" duration="101.863µs" 2026-03-19T11:57:50.690317202Z I0319 11:57:50.689370 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-86889676f6" duration="84.153µs" 2026-03-19T11:57:53.168082209Z I0319 11:57:53.168022 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-5dc6c74576" duration="10.720038ms" 2026-03-19T11:57:53.168189382Z I0319 11:57:53.168160 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-5dc6c74576" duration="61.062µs" 2026-03-19T11:57:54.168563419Z I0319 11:57:54.168358 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-86889676f6" duration="129.534µs" kube-controller-manager_previous.log0000640000000000000000000003124015156762311033771 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-03-19T11:55:23.468122046Z I0319 11:55:23.467400 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467405 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467409 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467417 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467423 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467430 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467434 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467438 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467443 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467447 1 flags.go:64] FLAG: --secure-port="10257" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467452 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467456 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467460 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467464 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467468 1 flags.go:64] FLAG: --tls-cert-file="" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467472 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467477 1 flags.go:64] FLAG: --tls-min-version="" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467480 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467484 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467491 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467496 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467500 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467504 1 flags.go:64] FLAG: --v="2" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467513 1 flags.go:64] FLAG: --version="false" 2026-03-19T11:55:23.468122046Z I0319 11:55:23.467518 1 flags.go:64] FLAG: --vmodule="" 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467692 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467699 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467703 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467709 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467714 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467718 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467722 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467726 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467730 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467733 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467736 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467739 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467743 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467746 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467750 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467753 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467757 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467760 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467777 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467781 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-03-19T11:55:23.468122046Z W0319 11:55:23.467785 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467789 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467837 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467841 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467845 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467849 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467854 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467858 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467862 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467865 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467869 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467874 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467878 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467881 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467885 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467888 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467891 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467895 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467901 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467909 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467913 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467916 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467920 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467923 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467927 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467931 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467934 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467939 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467944 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467947 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467951 1 feature_gate.go:330] unrecognized feature gate: Example 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467956 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467960 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467963 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467967 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467971 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467974 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467977 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467981 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467985 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467988 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467992 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467995 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-03-19T11:55:23.468168437Z W0319 11:55:23.467998 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-03-19T11:55:23.468168437Z W0319 11:55:23.468002 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-03-19T11:55:23.468168437Z W0319 11:55:23.468005 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-03-19T11:55:23.468168437Z W0319 11:55:23.468009 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-03-19T11:55:23.468168437Z W0319 11:55:23.468012 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-03-19T11:55:23.468168437Z W0319 11:55:23.468016 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-03-19T11:55:23.468168437Z W0319 11:55:23.468019 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-03-19T11:55:23.468168437Z W0319 11:55:23.468023 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-03-19T11:55:23.468168437Z W0319 11:55:23.468026 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-03-19T11:55:23.800916179Z I0319 11:55:23.800828 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-03-19T11:55:23.802648664Z I0319 11:55:23.802618 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002734715156762311024636 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"785c8576-b9c1-4385-a130-48598c8e3a64","resourceVersion":"9660","creationTimestamp":"2026-03-19T11:52:39Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"46f265536aba6292ead501bc9b49f327","kubernetes.io/config.mirror":"46f265536aba6292ead501bc9b49f327","kubernetes.io/config.seen":"2026-03-19T11:51:09.971904210Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"538ea3c1-a257-4167-908a-2357320442cc","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:53Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:53Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:53:50Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-03-19T11:51:23Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","containerID":"cri-o://37d48d754396bd1bc2527510939d9c6fc67f46e6581c207179d0cd71cd638e7d","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-03-19T11:56:00Z"}},"lastState":{"terminated":{"exitCode":2,"reason":"Error","startedAt":"2026-03-19T11:55:23Z","finishedAt":"2026-03-19T11:56:00Z","containerID":"cri-o://84d3d820222fb615bbd44a77bcef4de4c96b78f545a4bc5490f5fa77f0e958e7"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","containerID":"cri-o://d27eb2ebaac292762ef9b813ca8ecd2562af748c7508755cdddd461f45526f66","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415156762311044316 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-fjn4b2026-03-19T11:56:48.639736865Z I0319 11:56:48.639576 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:56:48.639736865Z I0319 11:56:48.639691 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:56:48.650569607Z I0319 11:56:48.646567 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:48.686644206Z I0319 11:56:48.686571 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-19T11:56:59.811873513Z I0319 11:56:59.809542 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:56:59.811873513Z W0319 11:56:59.809568 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.811873513Z W0319 11:56:59.809574 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.811873513Z W0319 11:56:59.809577 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:56:59.811873513Z W0319 11:56:59.809581 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:56:59.811873513Z W0319 11:56:59.809584 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:56:59.811873513Z W0319 11:56:59.809587 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:56:59.837864243Z I0319 11:56:59.837787 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:56:59.837910145Z I0319 11:56:59.837891 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:56:59.838091211Z I0319 11:56:59.838034 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:56:59.838143062Z I0319 11:56:59.838132 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:59.838379940Z I0319 11:56:59.838328 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:56:59.838724811Z I0319 11:56:59.838554 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:56:59.843511432Z I0319 11:56:59.843412 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:56:59.843744779Z I0319 11:56:59.843698 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:56:59.844007127Z I0319 11:56:59.843955 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:56:59.844007127Z I0319 11:56:59.843979 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.844319397Z I0319 11:56:59.844304 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-03-19T11:56:59.940128413Z I0319 11:56:59.940039 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:59.943917092Z I0319 11:56:59.943851 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:56:59.944057696Z I0319 11:56:59.944026 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000004650115156762311044521 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-fjn4b2026-03-19T11:55:09.414238668Z I0319 11:55:09.414227 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-19T11:55:09.414251738Z I0319 11:55:09.414245 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-19T11:55:09.415729745Z I0319 11:55:09.414418 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.414447 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.414461 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.414683 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.414693 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.414700 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.414709 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415059 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415091 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415110 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415120 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415141 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415150 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415201 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415268 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415273 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415317 1 base_controller.go:181] Shutting down GuardController ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415335 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415375 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415391 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415406 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415419 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415429 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415439 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415443 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415451 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415463 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415472 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415483 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415488 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415495 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415463 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415511 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415523 1 controller_manager.go:54] GuardController controller terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415521 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415543 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415551 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415511 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415571 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415571 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415455 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415589 1 base_controller.go:181] Shutting down Installer ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415593 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415627 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415638 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415646 1 controller_manager.go:54] PruneController controller terminated 2026-03-19T11:55:09.415729745Z I0319 11:55:09.415695 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-19T11:55:09.416067316Z I0319 11:55:09.416012 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-19T11:55:09.416067316Z I0319 11:55:09.416040 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-19T11:55:09.416067316Z I0319 11:55:09.416054 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-19T11:55:09.416118977Z I0319 11:55:09.416083 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-19T11:55:09.416249251Z I0319 11:55:09.416214 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:55:09.416249251Z I0319 11:55:09.416242 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:55:09.416280692Z I0319 11:55:09.416261 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:55:09.416761377Z I0319 11:55:09.416714 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-19T11:55:09.416761377Z I0319 11:55:09.416744 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-19T11:55:09.416761377Z I0319 11:55:09.416753 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-19T11:55:09.416987224Z I0319 11:55:09.416928 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3933465436/tls.crt::/tmp/serving-cert-3933465436/tls.key" 2026-03-19T11:55:09.417004014Z I0319 11:55:09.416989 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:55:09.417004014Z I0319 11:55:09.416999 1 builder.go:335] server exited 2026-03-19T11:55:09.417148419Z E0319 11:55:09.417112 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:09.417157879Z I0319 11:55:09.417152 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-19T11:55:09.417165539Z I0319 11:55:09.417158 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-19T11:55:09.417174610Z I0319 11:55:09.417165 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:55:09.417182610Z I0319 11:55:09.417171 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:55:09.417182610Z I0319 11:55:09.417178 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-03-19T11:55:09.417190260Z I0319 11:55:09.417182 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-03-19T11:55:09.418257234Z I0319 11:55:09.417273 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-19T11:55:09.418257234Z I0319 11:55:09.417308 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:55:09.418257234Z I0319 11:55:09.417318 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:55:09.418257234Z I0319 11:55:09.417325 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-19T11:55:09.418257234Z I0319 11:55:09.417334 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-19T11:55:09.418257234Z I0319 11:55:09.417342 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:55:09.418257234Z I0319 11:55:09.417349 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-19T11:55:09.418257234Z I0319 11:55:09.417513 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"6e185186-71c6-497c-b98e-a867a5718262", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ConfigMapCreateFailed' Failed to create ConfigMap/cluster-policy-controller-config-3 -n openshift-kube-controller-manager: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/configmaps": context canceled 2026-03-19T11:55:09.418257234Z I0319 11:55:09.417554 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"6e185186-71c6-497c-b98e-a867a5718262", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 2 count 0 on node "master-0": Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0": context canceled 2026-03-19T11:55:09.418911645Z I0319 11:55:09.418854 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-19T11:55:09.418911645Z I0319 11:55:09.418894 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-19T11:55:09.419383969Z W0319 11:55:09.419317 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:55:09.419383969Z W0319 11:55:09.419358 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:55:09.419383969Z W0319 11:55:09.419373 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-19T11:55:09.419655277Z E0319 11:55:09.419603 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:09.421445034Z E0319 11:55:09.421381 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/localhost-recovery-client-crb.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:operator:kube-controller-manager-recovery\": context canceled, \"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:09.421470465Z I0319 11:55:09.421454 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-19T11:55:09.421506056Z I0319 11:55:09.421473 1 base_controller.go:113] All Installer workers have been terminated 2026-03-19T11:55:09.421506056Z I0319 11:55:09.421495 1 controller_manager.go:54] Installer controller terminated 2026-03-19T11:55:09.423309122Z I0319 11:55:09.423235 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-19T11:55:09.423329153Z I0319 11:55:09.423319 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-19T11:55:09.423693464Z W0319 11:55:09.423647 1 base_controller.go:242] Updating status of "RevisionController" failed: unable to ApplyStatus for operator using fieldManager "RevisionController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-19T11:55:09.423704205Z E0319 11:55:09.423694 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: Post \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/configmaps\": context canceled" 2026-03-19T11:55:09.424945313Z I0319 11:55:09.424882 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:55:09.424945313Z I0319 11:55:09.424929 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:55:09.424962563Z I0319 11:55:09.424944 1 controller_manager.go:54] RevisionController controller terminated 2026-03-19T11:55:14.413772233Z I0319 11:55:14.413654 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:55:43.422018550Z E0319 11:55:43.421948 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-controller-manager-operator.189e3c0843375461 openshift-kube-controller-manager-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-kube-controller-manager-operator,Name:kube-controller-manager-operator,UID:6e185186-71c6-497c-b98e-a867a5718262,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:InstallerPodFailed,Message:Failed to create installer pod for revision 2 count 0 on node \"master-0\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0\": context canceled,Source:EventSource{Component:kube-controller-manager-operator-installer-controller,Host:,},FirstTimestamp:2026-03-19 11:55:09.415658593 +0000 UTC m=+80.655149171,LastTimestamp:2026-03-19 11:55:09.415658593 +0000 UTC m=+80.655149171,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-controller-manager-operator-installer-controller,ReportingInstance:,}" 2026-03-19T11:55:43.422170085Z E0319 11:55:43.422112 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:43.422250107Z W0319 11:55:43.422203 1 leaderelection.go:84] leader election lost 2026-03-19T11:55:43.422305459Z E0319 11:55:43.422216 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-controller-manager-operator.189e3c0843262f91 openshift-kube-controller-manager-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-kube-controller-manager-operator,Name:kube-controller-manager-operator,UID:6e185186-71c6-497c-b98e-a867a5718262,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ConfigMapCreateFailed,Message:Failed to create ConfigMap/cluster-policy-controller-config-3 -n openshift-kube-controller-manager: Post \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/configmaps\": context canceled,Source:EventSource{Component:kube-controller-manager-operator-revisioncontroller,Host:,},FirstTimestamp:2026-03-19 11:55:09.414535057 +0000 UTC m=+80.654025635,LastTimestamp:2026-03-19 11:55:09.414535057 +0000 UTC m=+80.654025635,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-controller-manager-operator-revisioncontroller,ReportingInstance:,}" kube-controller-manager-operator-ff989d6cc-fjn4b.json0000640000000000000000000001450415156762311033437 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-ff989d6cc-fjn4b","generateName":"kube-controller-manager-operator-ff989d6cc-","namespace":"openshift-kube-controller-manager-operator","uid":"2151eb84-177e-459c-be71-f48465323ac2","resourceVersion":"9582","creationTimestamp":"2026-03-19T11:51:45Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"ff989d6cc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-ff989d6cc","uid":"71b9e8af-e866-4666-bedd-e5f3b1a1091b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67c988e079558dc6b20232ebf9a7f7276fee60c756caed584c9715e0bec77a5a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:49Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-03-19T11:53:37Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:48Z","finishedAt":"2026-03-19T11:55:43Z","containerID":"cri-o://76df0534cc0fd6a5cc55f7565b57a91fd38d7e12169a76c5133f215b1479d2db"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","containerID":"cri-o://23286ba4628a82812269a3406ed2726173e555e1325fc481a5647ab01552687f","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000001642515156762311031012 0ustar00000000000000002026-03-19T11:54:48.148021272Z I0319 11:54:48.142563 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0009dd540 cert-dir:0xc0009dd720 cert-secrets:0xc0009dd4a0 configmaps:0xc0009dd040 namespace:0xc0009dce60 optional-cert-configmaps:0xc0009dd680 optional-configmaps:0xc0009dd180 optional-secrets:0xc0009dd0e0 pod:0xc0009dcf00 pod-manifest-dir:0xc0009dd2c0 resource-dir:0xc0009dd220 revision:0xc0009dcdc0 secrets:0xc0009dcfa0 v:0xc0009ea1e0] [0xc0009ea1e0 0xc0009dcdc0 0xc0009dce60 0xc0009dcf00 0xc0009dd220 0xc0009dd2c0 0xc0009dd040 0xc0009dd180 0xc0009dcfa0 0xc0009dd0e0 0xc0009dd720 0xc0009dd540 0xc0009dd680 0xc0009dd4a0] [] map[cert-configmaps:0xc0009dd540 cert-dir:0xc0009dd720 cert-secrets:0xc0009dd4a0 configmaps:0xc0009dd040 help:0xc0009ea5a0 kubeconfig:0xc0009dcd20 log-flush-frequency:0xc0009ea140 namespace:0xc0009dce60 optional-cert-configmaps:0xc0009dd680 optional-cert-secrets:0xc0009dd5e0 optional-configmaps:0xc0009dd180 optional-secrets:0xc0009dd0e0 pod:0xc0009dcf00 pod-manifest-dir:0xc0009dd2c0 pod-manifests-lock-file:0xc0009dd400 resource-dir:0xc0009dd220 revision:0xc0009dcdc0 secrets:0xc0009dcfa0 timeout-duration:0xc0009dd360 v:0xc0009ea1e0 vmodule:0xc0009ea280] [0xc0009dcd20 0xc0009dcdc0 0xc0009dce60 0xc0009dcf00 0xc0009dcfa0 0xc0009dd040 0xc0009dd0e0 0xc0009dd180 0xc0009dd220 0xc0009dd2c0 0xc0009dd360 0xc0009dd400 0xc0009dd4a0 0xc0009dd540 0xc0009dd5e0 0xc0009dd680 0xc0009dd720 0xc0009ea140 0xc0009ea1e0 0xc0009ea280 0xc0009ea5a0] [0xc0009dd540 0xc0009dd720 0xc0009dd4a0 0xc0009dd040 0xc0009ea5a0 0xc0009dcd20 0xc0009ea140 0xc0009dce60 0xc0009dd680 0xc0009dd5e0 0xc0009dd180 0xc0009dd0e0 0xc0009dcf00 0xc0009dd2c0 0xc0009dd400 0xc0009dd220 0xc0009dcdc0 0xc0009dcfa0 0xc0009dd360 0xc0009ea1e0 0xc0009ea280] map[104:0xc0009ea5a0 118:0xc0009ea1e0] [] -1 0 0xc00099d500 true 0x77ba20 []} 2026-03-19T11:54:48.148021272Z I0319 11:54:48.142923 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000054b60)({ 2026-03-19T11:54:48.148021272Z KubeConfig: (string) "", 2026-03-19T11:54:48.148021272Z KubeClient: (kubernetes.Interface) , 2026-03-19T11:54:48.148021272Z Revision: (string) (len=1) "2", 2026-03-19T11:54:48.148021272Z NodeName: (string) "", 2026-03-19T11:54:48.148021272Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-03-19T11:54:48.148021272Z Clock: (clock.RealClock) { 2026-03-19T11:54:48.148021272Z }, 2026-03-19T11:54:48.148021272Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-03-19T11:54:48.148021272Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-19T11:54:48.148021272Z (string) (len=27) "service-account-private-key", 2026-03-19T11:54:48.148021272Z (string) (len=31) "localhost-recovery-client-token" 2026-03-19T11:54:48.148021272Z }, 2026-03-19T11:54:48.148021272Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:48.148021272Z (string) (len=12) "serving-cert" 2026-03-19T11:54:48.148021272Z }, 2026-03-19T11:54:48.148021272Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-19T11:54:48.148021272Z (string) (len=27) "kube-controller-manager-pod", 2026-03-19T11:54:48.148021272Z (string) (len=6) "config", 2026-03-19T11:54:48.148021272Z (string) (len=32) "cluster-policy-controller-config", 2026-03-19T11:54:48.148021272Z (string) (len=29) "controller-manager-kubeconfig", 2026-03-19T11:54:48.148021272Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-03-19T11:54:48.148021272Z (string) (len=17) "serviceaccount-ca", 2026-03-19T11:54:48.148021272Z (string) (len=10) "service-ca", 2026-03-19T11:54:48.148021272Z (string) (len=15) "recycler-config" 2026-03-19T11:54:48.148021272Z }, 2026-03-19T11:54:48.148021272Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:48.148021272Z (string) (len=12) "cloud-config" 2026-03-19T11:54:48.148021272Z }, 2026-03-19T11:54:48.148021272Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-03-19T11:54:48.148021272Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-03-19T11:54:48.148021272Z (string) (len=10) "csr-signer" 2026-03-19T11:54:48.148021272Z }, 2026-03-19T11:54:48.148021272Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-19T11:54:48.148021272Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-19T11:54:48.148021272Z (string) (len=20) "aggregator-client-ca", 2026-03-19T11:54:48.148021272Z (string) (len=9) "client-ca" 2026-03-19T11:54:48.148021272Z }, 2026-03-19T11:54:48.148021272Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:48.148021272Z (string) (len=17) "trusted-ca-bundle" 2026-03-19T11:54:48.148021272Z }, 2026-03-19T11:54:48.148021272Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-19T11:54:48.148021272Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-19T11:54:48.148021272Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-19T11:54:48.148021272Z Timeout: (time.Duration) 2m0s, 2026-03-19T11:54:48.148021272Z StaticPodManifestsLockFile: (string) "", 2026-03-19T11:54:48.148021272Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-19T11:54:48.148021272Z KubeletVersion: (string) "" 2026-03-19T11:54:48.148021272Z }) 2026-03-19T11:54:48.148901788Z I0319 11:54:48.148856 1 cmd.go:413] Getting controller reference for node master-0 2026-03-19T11:54:48.186030452Z I0319 11:54:48.185980 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-19T11:54:48.186121684Z I0319 11:54:48.186106 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:54:48.186151315Z I0319 11:54:48.186140 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:54:48.365652868Z I0319 11:54:48.365601 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-19T11:55:12.370132886Z W0319 11:55:12.369969 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:55:32.369077465Z W0319 11:55:32.368991 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:55:52.366969331Z W0319 11:55:52.366898 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:06.369289221Z W0319 11:56:06.369140 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-19T11:56:06.369289221Z F0319 11:56:06.369211 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-controller-manager/installer-2-master-0.json0000640000000000000000000001707715156762311024503 0ustar0000000000000000{"metadata":{"name":"installer-2-master-0","namespace":"openshift-kube-controller-manager","uid":"2e4442dc-19e2-42a3-b5d9-7af7765b1939","resourceVersion":"9573","creationTimestamp":"2026-03-19T11:54:46Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.58/23\"],\"mac_address\":\"0a:58:0a:80:00:3a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.58/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.58\"\n ],\n \"mac\": \"0a:58:0a:80:00:3a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-2","uid":"d96c4ecb-758f-4c00-b8d7-41a5ef44cde5"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=2","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:46Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:47Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:47Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:46Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.58","podIPs":[{"ip":"10.128.0.58"}],"startTime":"2026-03-19T11:54:46Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0319 11:54:48.148856 1 cmd.go:413] Getting controller reference for node master-0\nI0319 11:54:48.185980 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0319 11:54:48.186106 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:54:48.186140 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:54:48.365601 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0319 11:55:12.369969 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0319 11:55:32.368991 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0319 11:55:52.366898 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0319 11:56:06.369140 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0319 11:56:06.369211 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-19T11:54:47Z","finishedAt":"2026-03-19T11:56:06Z","containerID":"cri-o://01fb0bb7c58b7c7fb9f4e6423408b3fdefa74b9c0303c15e18382b768dd8f028"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","containerID":"cri-o://01fb0bb7c58b7c7fb9f4e6423408b3fdefa74b9c0303c15e18382b768dd8f028","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715156762311027212 0ustar00000000000000002026-03-19T11:54:42.266934904Z I0319 11:54:42.260549 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000b88be0 cert-dir:0xc000b88dc0 cert-secrets:0xc000b88b40 configmaps:0xc000b886e0 namespace:0xc000b88500 optional-cert-configmaps:0xc000b88d20 optional-cert-secrets:0xc000b88c80 optional-configmaps:0xc000b88820 optional-secrets:0xc000b88780 pod:0xc000b885a0 pod-manifest-dir:0xc000b88960 resource-dir:0xc000b888c0 revision:0xc000b88460 secrets:0xc000b88640 v:0xc000b98280] [0xc000b98280 0xc000b88460 0xc000b88500 0xc000b885a0 0xc000b888c0 0xc000b88960 0xc000b886e0 0xc000b88820 0xc000b88640 0xc000b88780 0xc000b88dc0 0xc000b88be0 0xc000b88d20 0xc000b88b40 0xc000b88c80] [] map[cert-configmaps:0xc000b88be0 cert-dir:0xc000b88dc0 cert-secrets:0xc000b88b40 configmaps:0xc000b886e0 help:0xc000b98640 kubeconfig:0xc000b883c0 log-flush-frequency:0xc000b981e0 namespace:0xc000b88500 optional-cert-configmaps:0xc000b88d20 optional-cert-secrets:0xc000b88c80 optional-configmaps:0xc000b88820 optional-secrets:0xc000b88780 pod:0xc000b885a0 pod-manifest-dir:0xc000b88960 pod-manifests-lock-file:0xc000b88aa0 resource-dir:0xc000b888c0 revision:0xc000b88460 secrets:0xc000b88640 timeout-duration:0xc000b88a00 v:0xc000b98280 vmodule:0xc000b98320] [0xc000b883c0 0xc000b88460 0xc000b88500 0xc000b885a0 0xc000b88640 0xc000b886e0 0xc000b88780 0xc000b88820 0xc000b888c0 0xc000b88960 0xc000b88a00 0xc000b88aa0 0xc000b88b40 0xc000b88be0 0xc000b88c80 0xc000b88d20 0xc000b88dc0 0xc000b981e0 0xc000b98280 0xc000b98320 0xc000b98640] [0xc000b88be0 0xc000b88dc0 0xc000b88b40 0xc000b886e0 0xc000b98640 0xc000b883c0 0xc000b981e0 0xc000b88500 0xc000b88d20 0xc000b88c80 0xc000b88820 0xc000b88780 0xc000b885a0 0xc000b88960 0xc000b88aa0 0xc000b888c0 0xc000b88460 0xc000b88640 0xc000b88a00 0xc000b98280 0xc000b98320] map[104:0xc000b98640 118:0xc000b98280] [] -1 0 0xc000b476e0 true 0xae2140 []} 2026-03-19T11:54:42.266934904Z I0319 11:54:42.260977 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0008c9ba0)({ 2026-03-19T11:54:42.266934904Z KubeConfig: (string) "", 2026-03-19T11:54:42.266934904Z KubeClient: (kubernetes.Interface) , 2026-03-19T11:54:42.266934904Z Revision: (string) (len=1) "1", 2026-03-19T11:54:42.266934904Z NodeName: (string) "", 2026-03-19T11:54:42.266934904Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-19T11:54:42.266934904Z Clock: (clock.RealClock) { 2026-03-19T11:54:42.266934904Z }, 2026-03-19T11:54:42.266934904Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-19T11:54:42.266934904Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-19T11:54:42.266934904Z (string) (len=11) "etcd-client", 2026-03-19T11:54:42.266934904Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-19T11:54:42.266934904Z (string) (len=31) "localhost-recovery-client-token" 2026-03-19T11:54:42.266934904Z }, 2026-03-19T11:54:42.266934904Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-19T11:54:42.266934904Z (string) (len=17) "encryption-config", 2026-03-19T11:54:42.266934904Z (string) (len=21) "webhook-authenticator" 2026-03-19T11:54:42.266934904Z }, 2026-03-19T11:54:42.266934904Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-19T11:54:42.266934904Z (string) (len=18) "kube-apiserver-pod", 2026-03-19T11:54:42.266934904Z (string) (len=6) "config", 2026-03-19T11:54:42.266934904Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-19T11:54:42.266934904Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-19T11:54:42.266934904Z (string) (len=15) "etcd-serving-ca", 2026-03-19T11:54:42.266934904Z (string) (len=18) "kubelet-serving-ca", 2026-03-19T11:54:42.266934904Z (string) (len=22) "sa-token-signing-certs", 2026-03-19T11:54:42.266934904Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-19T11:54:42.266934904Z }, 2026-03-19T11:54:42.266934904Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-19T11:54:42.266934904Z (string) (len=14) "oauth-metadata", 2026-03-19T11:54:42.266934904Z (string) (len=12) "cloud-config", 2026-03-19T11:54:42.266934904Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-19T11:54:42.266934904Z }, 2026-03-19T11:54:42.266934904Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-19T11:54:42.266934904Z (string) (len=17) "aggregator-client", 2026-03-19T11:54:42.266934904Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-19T11:54:42.266934904Z (string) (len=31) "service-network-serving-certkey", 2026-03-19T11:54:42.266934904Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-19T11:54:42.266934904Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-19T11:54:42.266934904Z (string) (len=33) "bound-service-account-signing-key", 2026-03-19T11:54:42.266934904Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-19T11:54:42.266934904Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-19T11:54:42.266934904Z (string) (len=14) "kubelet-client", 2026-03-19T11:54:42.266934904Z (string) (len=16) "node-kubeconfigs" 2026-03-19T11:54:42.266934904Z }, 2026-03-19T11:54:42.266934904Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-19T11:54:42.266934904Z (string) (len=17) "user-serving-cert", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-000", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-001", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-002", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-003", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-004", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-005", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-006", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-007", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-008", 2026-03-19T11:54:42.266934904Z (string) (len=21) "user-serving-cert-009" 2026-03-19T11:54:42.266934904Z }, 2026-03-19T11:54:42.266934904Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-19T11:54:42.266934904Z (string) (len=20) "aggregator-client-ca", 2026-03-19T11:54:42.266934904Z (string) (len=9) "client-ca", 2026-03-19T11:54:42.266934904Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-19T11:54:42.266934904Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-19T11:54:42.266934904Z }, 2026-03-19T11:54:42.266934904Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-19T11:54:42.266934904Z (string) (len=17) "trusted-ca-bundle" 2026-03-19T11:54:42.266934904Z }, 2026-03-19T11:54:42.266934904Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-19T11:54:42.266934904Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-19T11:54:42.266934904Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-19T11:54:42.266934904Z Timeout: (time.Duration) 2m0s, 2026-03-19T11:54:42.266934904Z StaticPodManifestsLockFile: (string) "", 2026-03-19T11:54:42.266934904Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-19T11:54:42.266934904Z KubeletVersion: (string) "" 2026-03-19T11:54:42.266934904Z }) 2026-03-19T11:54:42.273830381Z I0319 11:54:42.273756 1 cmd.go:413] Getting controller reference for node master-0 2026-03-19T11:54:42.347712244Z I0319 11:54:42.347658 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-19T11:54:42.347753335Z I0319 11:54:42.347729 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:54:42.347753335Z I0319 11:54:42.347743 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:54:42.356741727Z I0319 11:54:42.356684 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-19T11:55:12.357023906Z I0319 11:55:12.356940 1 cmd.go:524] Getting installer pods for node master-0 2026-03-19T11:55:26.360234777Z F0319 11:55:26.359509 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115156762311022672 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"632bdf3b-0ba0-4874-a2ec-8396683c35c5","resourceVersion":"9518","creationTimestamp":"2026-03-19T11:54:33Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.49/23\"],\"mac_address\":\"0a:58:0a:80:00:31\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.49/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.49\"\n ],\n \"mac\": \"0a:58:0a:80:00:31\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"e7d89526-5068-48ec-baaa-65f7ae85b4c6"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:33Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:00Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:00Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:33Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.49","podIPs":[{"ip":"10.128.0.49"}],"startTime":"2026-03-19T11:54:33Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0319 11:54:42.273756 1 cmd.go:413] Getting controller reference for node master-0\nI0319 11:54:42.347658 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0319 11:54:42.347729 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:54:42.347743 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:54:42.356684 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0319 11:55:12.356940 1 cmd.go:524] Getting installer pods for node master-0\nF0319 11:55:26.359509 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-19T11:54:41Z","finishedAt":"2026-03-19T11:55:26Z","containerID":"cri-o://0db01150a16f0758697f4004ab15abe194def9a3c61ba179de9b9e1316f2ccf4"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://0db01150a16f0758697f4004ab15abe194def9a3c61ba179de9b9e1316f2ccf4","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615156762311035772 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-19T11:51:27.116815853Z I0319 11:51:27.116558 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010234015156762311032662 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-19T11:57:49.463856235Z Trace[1490160507]: ---"About to write a response" 644ms (11:57:49.463) 2026-03-19T11:57:49.463856235Z Trace[1490160507]: [644.314575ms] [644.314575ms] END 2026-03-19T11:57:49.464050582Z I0319 11:57:49.464004 1 trace.go:236] Trace[1029651908]: "Create" accept:application/json, */*,audit-id:c378edd5-1924-4dd2-9271-509c04311185,client:10.128.0.27,api-group:,api-version:v1,name:,subresource:,namespace:openshift-marketplace,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/openshift-marketplace/serviceaccounts,user-agent:catalog/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (19-Mar-2026 11:57:48.800) (total time: 662ms): 2026-03-19T11:57:49.464050582Z Trace[1029651908]: ---"Write to database call failed" len:385,err:serviceaccounts "redhat-marketplace" already exists 293ms (11:57:49.463) 2026-03-19T11:57:49.464050582Z Trace[1029651908]: [662.980413ms] [662.980413ms] END 2026-03-19T11:57:49.464681922Z I0319 11:57:49.464418 1 trace.go:236] Trace[2060892619]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:be73a2d1-7da1-449a-9ba0-fc05955a39c4,client:192.168.32.10,api-group:rbac.authorization.k8s.io,api-version:v1,name:openshift-dns-operator,subresource:,namespace:,protocol:HTTP/2.0,resource:clusterrolebindings,scope:resource,url:/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/openshift-dns-operator,user-agent:cluster-version-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (19-Mar-2026 11:57:48.844) (total time: 619ms): 2026-03-19T11:57:49.464681922Z Trace[2060892619]: ---"About to write a response" 619ms (11:57:49.464) 2026-03-19T11:57:49.464681922Z Trace[2060892619]: [619.780081ms] [619.780081ms] END 2026-03-19T11:57:49.464788295Z I0319 11:57:49.464753 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.465102655Z I0319 11:57:49.465053 1 trace.go:236] Trace[376365556]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:851da39a-e70b-46ef-b946-c4e1b934470b,client:192.168.32.10,api-group:rbac.authorization.k8s.io,api-version:v1,name:prometheus-k8s,subresource:,namespace:openshift-kube-controller-manager,protocol:HTTP/2.0,resource:rolebindings,scope:resource,url:/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-kube-controller-manager/rolebindings/prometheus-k8s,user-agent:cluster-version-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (19-Mar-2026 11:57:48.895) (total time: 569ms): 2026-03-19T11:57:49.465102655Z Trace[376365556]: ---"About to write a response" 569ms (11:57:49.464) 2026-03-19T11:57:49.465102655Z Trace[376365556]: [569.680849ms] [569.680849ms] END 2026-03-19T11:57:49.466421136Z I0319 11:57:49.466379 1 trace.go:236] Trace[1023054233]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:1902937e-eaec-402b-96b9-13a5213da3f3,client:192.168.32.10,api-group:rbac.authorization.k8s.io,api-version:v1,name:prometheus-k8s,subresource:,namespace:openshift-kube-apiserver,protocol:HTTP/2.0,resource:roles,scope:resource,url:/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-kube-apiserver/roles/prometheus-k8s,user-agent:cluster-version-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (19-Mar-2026 11:57:48.919) (total time: 546ms): 2026-03-19T11:57:49.466421136Z Trace[1023054233]: ---"About to write a response" 546ms (11:57:49.466) 2026-03-19T11:57:49.466421136Z Trace[1023054233]: [546.93794ms] [546.93794ms] END 2026-03-19T11:57:49.467980566Z I0319 11:57:49.466872 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.467980566Z I0319 11:57:49.467305 1 trace.go:236] Trace[173397632]: "Get" accept:application/json, */*,audit-id:f89aba8c-a99b-496a-84be-ff39c5fd1030,client:10.128.0.16,api-group:,api-version:v1,name:machine-config-daemon,subresource:,namespace:openshift-machine-config-operator,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/openshift-machine-config-operator/serviceaccounts/machine-config-daemon,user-agent:machine-config-operator/v0.0.0 (linux/amd64) kubernetes/$Format/machine-config,verb:GET (19-Mar-2026 11:57:48.804) (total time: 663ms): 2026-03-19T11:57:49.467980566Z Trace[173397632]: ---"About to write a response" 663ms (11:57:49.467) 2026-03-19T11:57:49.467980566Z Trace[173397632]: [663.065727ms] [663.065727ms] END 2026-03-19T11:57:49.468612495Z I0319 11:57:49.468568 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.469100251Z I0319 11:57:49.469071 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.474292895Z I0319 11:57:49.474171 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.474547533Z I0319 11:57:49.474504 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.474763460Z I0319 11:57:49.474722 1 trace.go:236] Trace[1525291792]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:9d0309a1-b443-4316-b476-fdcb19348d26,client:192.168.32.10,api-group:,api-version:v1,name:trusted-ca-bundle,subresource:,namespace:openshift-apiserver-operator,protocol:HTTP/2.0,resource:configmaps,scope:resource,url:/api/v1/namespaces/openshift-apiserver-operator/configmaps/trusted-ca-bundle,user-agent:cluster-version-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (19-Mar-2026 11:57:48.869) (total time: 604ms): 2026-03-19T11:57:49.474763460Z Trace[1525291792]: ---"About to write a response" 595ms (11:57:49.465) 2026-03-19T11:57:49.474763460Z Trace[1525291792]: [604.045653ms] [604.045653ms] END 2026-03-19T11:57:49.475286876Z I0319 11:57:49.475253 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.541008181Z I0319 11:57:49.536387 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.547666462Z I0319 11:57:49.546349 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.568411637Z I0319 11:57:49.568348 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.568411637Z I0319 11:57:49.568375 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.568888411Z I0319 11:57:49.568863 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.581645205Z I0319 11:57:49.581583 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.599835629Z I0319 11:57:49.595566 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.653346548Z I0319 11:57:49.652882 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.664064577Z I0319 11:57:49.663997 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.664359896Z I0319 11:57:49.664336 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.763693573Z I0319 11:57:49.762777 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.763693573Z I0319 11:57:49.762964 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.765068326Z I0319 11:57:49.765039 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.765459478Z I0319 11:57:49.765428 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.766699288Z I0319 11:57:49.766656 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.768559856Z I0319 11:57:49.768518 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.768949769Z I0319 11:57:49.768915 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.771074056Z I0319 11:57:49.771010 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.817470801Z I0319 11:57:49.817367 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.854083117Z I0319 11:57:49.853980 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.918139150Z I0319 11:57:49.918048 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:49.998100264Z I0319 11:57:49.998034 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.053636618Z I0319 11:57:50.053564 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.119773767Z I0319 11:57:50.118152 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.197569903Z I0319 11:57:50.197127 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.252374493Z I0319 11:57:50.252275 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.318702158Z I0319 11:57:50.318609 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.399226160Z I0319 11:57:50.399155 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.455906850Z I0319 11:57:50.455819 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.518675242Z I0319 11:57:50.518576 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.596879801Z I0319 11:57:50.596771 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.652672563Z I0319 11:57:50.652612 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.718840453Z I0319 11:57:50.718754 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.796878607Z I0319 11:57:50.796818 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.852742420Z I0319 11:57:50.852671 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:50.918523687Z I0319 11:57:50.918441 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.263489960Z I0319 11:57:51.263162 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.264829443Z I0319 11:57:51.264750 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.272402581Z I0319 11:57:51.272317 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.272851586Z I0319 11:57:51.272820 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.280771806Z I0319 11:57:51.280689 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.318851808Z I0319 11:57:51.318733 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.396698147Z I0319 11:57:51.396622 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.452575091Z I0319 11:57:51.452472 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.518881424Z I0319 11:57:51.518109 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.597477096Z I0319 11:57:51.597410 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.654664681Z I0319 11:57:51.653958 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.719332743Z I0319 11:57:51.718613 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.796534331Z I0319 11:57:51.796442 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.852950093Z I0319 11:57:51.852880 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:51.997355062Z I0319 11:57:51.997288 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:52.053563387Z I0319 11:57:52.053482 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:52.197050858Z I0319 11:57:52.196996 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:52.253454269Z I0319 11:57:52.253406 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:52.397435155Z I0319 11:57:52.397362 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:52.453951820Z I0319 11:57:52.453816 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:52.653179621Z I0319 11:57:52.653095 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:52.853432583Z I0319 11:57:52.853100 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:52.965562414Z E0319 11:57:52.965476 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.44:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:57:52.965562414Z E0319 11:57:52.965494 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.53:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.53:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-03-19T11:57:52.965617236Z E0319 11:57:52.965581 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.44:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:57:52.972472133Z E0319 11:57:52.967538 1 remote_available_controller.go:470] "Unhandled Error" err="v1.oauth.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:57:52.972472133Z E0319 11:57:52.967763 1 remote_available_controller.go:470] "Unhandled Error" err="v1.build.openshift.io failed with: failing or missing response from https://10.128.0.44:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/build.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:57:52.973917128Z E0319 11:57:52.973302 1 remote_available_controller.go:470] "Unhandled Error" err="v1.user.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401" logger="UnhandledError" 2026-03-19T11:57:53.004949868Z I0319 11:57:53.004827 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=3 seatDemandAvg=0.25343360423467365 seatDemandStdev=0.6538759687558259 seatDemandSmoothed=7.447112088644652 fairFrac=2.331974373907979 currentCL=3 concurrencyDenominator=3 backstop=false 2026-03-19T11:57:53.052918922Z I0319 11:57:53.052829 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:53.253725693Z I0319 11:57:53.253583 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:53.453045787Z I0319 11:57:53.452985 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:53.652962470Z I0319 11:57:53.652898 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:53.852301493Z I0319 11:57:53.852236 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:54.052815085Z I0319 11:57:54.052743 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:54.253364037Z I0319 11:57:54.253290 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-19T11:57:54.453537498Z I0319 11:57:54.453454 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015156762311031152 0ustar00000000000000002026-03-19T11:51:20.302600571Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115156762311037073 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-qv4cg2026-03-19T11:56:48.382851014Z I0319 11:56:48.378545 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:56:48.382851014Z I0319 11:56:48.378652 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:56:48.382851014Z I0319 11:56:48.379713 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:48.433837214Z I0319 11:56:48.427725 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-19T11:56:59.829139408Z I0319 11:56:59.828222 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:56:59.829139408Z W0319 11:56:59.828254 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.829139408Z W0319 11:56:59.828258 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.829139408Z W0319 11:56:59.828263 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:56:59.829139408Z W0319 11:56:59.828266 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:56:59.829139408Z W0319 11:56:59.828269 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:56:59.829139408Z W0319 11:56:59.828271 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:56:59.834129146Z I0319 11:56:59.833843 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:56:59.834129146Z I0319 11:56:59.833921 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:56:59.834129146Z I0319 11:56:59.833947 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:56:59.834129146Z I0319 11:56:59.833990 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:56:59.834151057Z I0319 11:56:59.834140 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:56:59.834429155Z I0319 11:56:59.834258 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:56:59.834429155Z I0319 11:56:59.834269 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:59.834429155Z I0319 11:56:59.834282 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:56:59.834429155Z I0319 11:56:59.834289 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.835072715Z I0319 11:56:59.834926 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:56:59.835334873Z I0319 11:56:59.835291 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-03-19T11:56:59.934555917Z I0319 11:56:59.934485 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.934601448Z I0319 11:56:59.934540 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:56:59.934680621Z I0319 11:56:59.934622 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000004060415156762311037273 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-qv4cg2026-03-19T11:55:19.859859275Z I0319 11:55:19.859853 1 base_controller.go:123] Shutting down worker of highCPUUsageAlertController controller ... 2026-03-19T11:55:19.859880975Z I0319 11:55:19.859857 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-19T11:55:19.859880975Z I0319 11:55:19.859861 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-03-19T11:55:19.859880975Z I0319 11:55:19.859787 1 base_controller.go:181] Shutting down kube-apiserver-Node ... 2026-03-19T11:55:19.859880975Z I0319 11:55:19.859365 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:55:19.859880975Z I0319 11:55:19.859854 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:55:19.859891866Z I0319 11:55:19.859876 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionMigration controller ... 2026-03-19T11:55:19.859891866Z I0319 11:55:19.859878 1 base_controller.go:123] Shutting down worker of KubeletVersionSkewController controller ... 2026-03-19T11:55:19.859891866Z I0319 11:55:19.859886 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionMigration workers have been terminated 2026-03-19T11:55:19.859900266Z I0319 11:55:19.859889 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:55:19.859900266Z I0319 11:55:19.859890 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:55:19.859908546Z I0319 11:55:19.859900 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:55:19.859916386Z I0319 11:55:19.859736 1 base_controller.go:181] Shutting down kube-apiserver-StaticPodState ... 2026-03-19T11:55:19.859916386Z I0319 11:55:19.859391 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-19T11:55:19.859916386Z I0319 11:55:19.859912 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2026-03-19T11:55:19.859927687Z I0319 11:55:19.859912 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-19T11:55:19.859927687Z I0319 11:55:19.859915 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:55:19.859927687Z I0319 11:55:19.859920 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2026-03-19T11:55:19.859927687Z I0319 11:55:19.859900 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:55:19.859937117Z I0319 11:55:19.859924 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:55:19.859937117Z I0319 11:55:19.859702 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-19T11:55:19.859937117Z I0319 11:55:19.859930 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-19T11:55:19.859937117Z I0319 11:55:19.859931 1 builder.go:335] server exited 2026-03-19T11:55:19.859945637Z I0319 11:55:19.859746 1 base_controller.go:181] Shutting down kube-apiserver-StaticPodStateFallback ... 2026-03-19T11:55:19.859945637Z I0319 11:55:19.859939 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-19T11:55:19.859953778Z I0319 11:55:19.859944 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-19T11:55:19.859953778Z I0319 11:55:19.859945 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-19T11:55:19.859953778Z I0319 11:55:19.859948 1 base_controller.go:181] Shutting down ServiceAccountIssuerController ... 2026-03-19T11:55:19.859962328Z I0319 11:55:19.859951 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-19T11:55:19.859962328Z I0319 11:55:19.859756 1 base_controller.go:181] Shutting down kube-apiserver-StartupMonitorPodCondition ... 2026-03-19T11:55:19.859962328Z I0319 11:55:19.859959 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-19T11:55:19.859970968Z I0319 11:55:19.859944 1 base_controller.go:113] All kube-apiserver-StaticPodStateFallback workers have been terminated 2026-03-19T11:55:19.859970968Z I0319 11:55:19.859965 1 base_controller.go:181] Shutting down CertRotationTimeUpgradeableController ... 2026-03-19T11:55:19.859970968Z I0319 11:55:19.859967 1 controller_manager.go:54] kube-apiserver-StaticPodStateFallback controller terminated 2026-03-19T11:55:19.859979398Z I0319 11:55:19.859966 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:55:19.859979398Z I0319 11:55:19.859973 1 base_controller.go:123] Shutting down worker of ServiceAccountIssuerController controller ... 2026-03-19T11:55:19.859987239Z I0319 11:55:19.859981 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-03-19T11:55:19.859987239Z I0319 11:55:19.859982 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-19T11:55:19.859995299Z I0319 11:55:19.859989 1 base_controller.go:123] Shutting down worker of kube-apiserver-RemoveStaleConditions controller ... 2026-03-19T11:55:19.859995299Z I0319 11:55:19.859991 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-19T11:55:19.860003329Z I0319 11:55:19.859764 1 base_controller.go:181] Shutting down kube-apiserver-InstallerState ... 2026-03-19T11:55:19.860003329Z I0319 11:55:19.859346 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionState controller ... 2026-03-19T11:55:19.860014340Z I0319 11:55:19.860002 1 base_controller.go:123] Shutting down worker of CertRotationTimeUpgradeableController controller ... 2026-03-19T11:55:19.860014340Z I0319 11:55:19.860007 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionState workers have been terminated 2026-03-19T11:55:19.860014340Z I0319 11:55:19.860009 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2026-03-19T11:55:19.860041830Z I0319 11:55:19.860029 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-19T11:55:19.860065771Z I0319 11:55:19.860057 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-19T11:55:19.860088772Z I0319 11:55:19.860080 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:55:19.860109973Z E0319 11:55:19.860057 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:19.860142144Z I0319 11:55:19.859959 1 base_controller.go:113] All kube-apiserver-StartupMonitorPodCondition workers have been terminated 2026-03-19T11:55:19.860150834Z I0319 11:55:19.860139 1 controller_manager.go:54] kube-apiserver-StartupMonitorPodCondition controller terminated 2026-03-19T11:55:19.860150834Z I0319 11:55:19.859933 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-19T11:55:19.860150834Z I0319 11:55:19.859839 1 base_controller.go:123] Shutting down worker of kube-apiserver-Node controller ... 2026-03-19T11:55:19.860161024Z I0319 11:55:19.860154 1 base_controller.go:113] All kube-apiserver-Node workers have been terminated 2026-03-19T11:55:19.860168804Z I0319 11:55:19.860159 1 controller_manager.go:54] kube-apiserver-Node controller terminated 2026-03-19T11:55:19.860168804Z E0319 11:55:19.859842 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:19.860168804Z I0319 11:55:19.859847 1 base_controller.go:113] All EventWatchController workers have been terminated 2026-03-19T11:55:19.860177145Z I0319 11:55:19.859848 1 base_controller.go:123] Shutting down worker of kube-apiserver-InstallerState controller ... 2026-03-19T11:55:19.860184995Z I0319 11:55:19.860176 1 base_controller.go:113] All kube-apiserver-InstallerState workers have been terminated 2026-03-19T11:55:19.860184995Z I0319 11:55:19.860181 1 controller_manager.go:54] kube-apiserver-InstallerState controller terminated 2026-03-19T11:55:19.860192615Z I0319 11:55:19.859854 1 base_controller.go:181] Shutting down GuardController ... 2026-03-19T11:55:19.860192615Z I0319 11:55:19.859858 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-03-19T11:55:19.860200645Z I0319 11:55:19.860192 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-03-19T11:55:19.860200645Z I0319 11:55:19.859864 1 base_controller.go:181] Shutting down KubeletVersionSkewController ... 2026-03-19T11:55:19.860208246Z I0319 11:55:19.860200 1 base_controller.go:113] All KubeletVersionSkewController workers have been terminated 2026-03-19T11:55:19.860208246Z I0319 11:55:19.859718 1 base_controller.go:181] Shutting down cluster-kube-apiserver-operator-UnsupportedConfigOverrides ... 2026-03-19T11:55:19.860219416Z I0319 11:55:19.860209 1 base_controller.go:113] All cluster-kube-apiserver-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-19T11:55:19.860219416Z I0319 11:55:19.860214 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2026-03-19T11:55:19.860227466Z I0319 11:55:19.859873 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-19T11:55:19.860227466Z I0319 11:55:19.860223 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-19T11:55:19.860235447Z I0319 11:55:19.860228 1 controller_manager.go:54] GuardController controller terminated 2026-03-19T11:55:19.860235447Z I0319 11:55:19.859923 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-19T11:55:19.860243457Z I0319 11:55:19.860236 1 controller_manager.go:54] PruneController controller terminated 2026-03-19T11:55:19.860243457Z I0319 11:55:19.859937 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-19T11:55:19.860251127Z I0319 11:55:19.860245 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:55:19.860258497Z I0319 11:55:19.860250 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-19T11:55:19.860258497Z I0319 11:55:19.859939 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-19T11:55:19.860266518Z I0319 11:55:19.859959 1 base_controller.go:181] Shutting down kube-apiserver-RemoveStaleConditions ... 2026-03-19T11:55:19.860266518Z I0319 11:55:19.860262 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2026-03-19T11:55:19.860274578Z I0319 11:55:19.859975 1 base_controller.go:181] Shutting down StatusSyncer_kube-apiserver ... 2026-03-19T11:55:19.860274578Z I0319 11:55:19.860270 1 base_controller.go:159] All StatusSyncer_kube-apiserver post start hooks have been terminated 2026-03-19T11:55:19.860282538Z I0319 11:55:19.860041 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-apiserver controller ... 2026-03-19T11:55:19.860296839Z I0319 11:55:19.860280 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2026-03-19T11:55:19.862310231Z I0319 11:55:19.861223 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-19T11:55:19.862310231Z I0319 11:55:19.861240 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-19T11:55:19.862310231Z I0319 11:55:19.861251 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-19T11:55:19.862310231Z I0319 11:55:19.861256 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-19T11:55:19.862310231Z I0319 11:55:19.861264 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-19T11:55:19.862310231Z I0319 11:55:19.861269 1 base_controller.go:113] All Installer workers have been terminated 2026-03-19T11:55:19.862310231Z I0319 11:55:19.861274 1 controller_manager.go:54] Installer controller terminated 2026-03-19T11:55:19.862310231Z W0319 11:55:19.861364 1 base_controller.go:242] Updating status of "NodeKubeconfigController" failed: unable to ApplyStatus for operator using fieldManager "NodeKubeconfigController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-19T11:55:19.862310231Z E0319 11:55:19.861396 1 base_controller.go:279] "Unhandled Error" err="NodeKubeconfigController reconciliation failed: \"secret/node-kubeconfigs\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs\": context canceled" 2026-03-19T11:55:19.862562989Z I0319 11:55:19.862538 1 base_controller.go:123] Shutting down worker of NodeKubeconfigController controller ... 2026-03-19T11:55:19.862562989Z I0319 11:55:19.862559 1 base_controller.go:113] All NodeKubeconfigController workers have been terminated 2026-03-19T11:55:19.866167222Z E0319 11:55:19.866122 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/localhost-recovery-client\": context canceled, \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:19.867348369Z I0319 11:55:19.867323 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2026-03-19T11:55:19.867397580Z I0319 11:55:19.867387 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2026-03-19T11:55:24.856514100Z I0319 11:55:24.856425 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:55:54.207643501Z E0319 11:55:54.199456 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:54.207643501Z W0319 11:55:54.199505 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-qv4cg.json0000640000000000000000000001362415156762311030067 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-8b68b9d9b-qv4cg","generateName":"kube-apiserver-operator-8b68b9d9b-","namespace":"openshift-kube-apiserver-operator","uid":"1089ea24-add9-482e-9276-e6ded12052d7","resourceVersion":"9591","creationTimestamp":"2026-03-19T11:51:45Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"8b68b9d9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-8b68b9d9b","uid":"7667efd4-ecf3-4063-b508-1d89c061c58d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-03-19T11:53:37Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:39Z","finishedAt":"2026-03-19T11:55:54Z","containerID":"cri-o://a04e94059c93f3fb95feb69e0b122c65aebac1f390cdd0cf514b18a508325ef8"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://9d4f9e0f3811159c5b4172ecd015dfd36c71001f3a7087b4596cd25f8695fe99","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007242515156762311025213 0ustar00000000000000002026-03-19T11:54:53.977514722Z 2026-03-19T11:54:53.977514722Z cluster-etcd-operator rev \ 2026-03-19T11:54:53.977514722Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-19T11:54:53.977514722Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-19T11:54:53.977514722Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-19T11:54:53.977514722Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-19T11:54:53.977514722Z securityContext: 2026-03-19T11:54:53.977514722Z privileged: true 2026-03-19T11:54:53.977514722Z resources: 2026-03-19T11:54:53.977514722Z requests: 2026-03-19T11:54:53.977514722Z memory: 50Mi 2026-03-19T11:54:53.977514722Z cpu: 10m 2026-03-19T11:54:53.977514722Z env: 2026-03-19T11:54:53.977514722Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-19T11:54:53.977514722Z value: "https://192.168.32.10:2379" 2026-03-19T11:54:53.977514722Z - name: "ETCDCTL_API" 2026-03-19T11:54:53.977514722Z value: "3" 2026-03-19T11:54:53.977514722Z - name: "ETCDCTL_CACERT" 2026-03-19T11:54:53.977514722Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-19T11:54:53.977514722Z - name: "ETCDCTL_CERT" 2026-03-19T11:54:53.977514722Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-19T11:54:53.977514722Z - name: "ETCDCTL_ENDPOINTS" 2026-03-19T11:54:53.977514722Z value: "https://192.168.32.10:2379" 2026-03-19T11:54:53.977514722Z - name: "ETCDCTL_KEY" 2026-03-19T11:54:53.977514722Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-19T11:54:53.977514722Z - name: "ETCD_CIPHER_SUITES" 2026-03-19T11:54:53.977514722Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-19T11:54:53.977514722Z - name: "ETCD_DATA_DIR" 2026-03-19T11:54:53.977514722Z value: "/var/lib/etcd" 2026-03-19T11:54:53.977514722Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-19T11:54:53.977514722Z value: "2500" 2026-03-19T11:54:53.977514722Z - name: "ETCD_ENABLE_PPROF" 2026-03-19T11:54:53.977610005Z value: "true" 2026-03-19T11:54:53.977610005Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-19T11:54:53.977610005Z value: "1" 2026-03-19T11:54:53.977610005Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-19T11:54:53.977610005Z value: "200ms" 2026-03-19T11:54:53.977610005Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-19T11:54:53.977610005Z value: "5s" 2026-03-19T11:54:53.977610005Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-19T11:54:53.977610005Z value: "500" 2026-03-19T11:54:53.977610005Z - name: "ETCD_IMAGE" 2026-03-19T11:54:53.977610005Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278" 2026-03-19T11:54:53.977610005Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-19T11:54:53.977610005Z value: "existing" 2026-03-19T11:54:53.977610005Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-19T11:54:53.977610005Z value: "8589934592" 2026-03-19T11:54:53.977610005Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-19T11:54:53.977610005Z value: "true" 2026-03-19T11:54:53.977610005Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-19T11:54:53.977610005Z value: "TLS1.2" 2026-03-19T11:54:53.977610005Z - name: "NODE_master_0_ETCD_NAME" 2026-03-19T11:54:53.977610005Z value: "master-0" 2026-03-19T11:54:53.977610005Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-19T11:54:53.977610005Z value: "192.168.32.10" 2026-03-19T11:54:53.977610005Z - name: "NODE_master_0_IP" 2026-03-19T11:54:53.977610005Z value: "192.168.32.10" 2026-03-19T11:54:53.977610005Z volumeMounts: 2026-03-19T11:54:53.977610005Z - mountPath: /var/lib/etcd 2026-03-19T11:54:53.977610005Z name: data-dir 2026-03-19T11:54:53.977610005Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-19T11:54:53.977610005Z name: cert-dir 2026-03-19T11:54:53.977610005Z hostNetwork: true 2026-03-19T11:54:53.977610005Z priority: 2000001000 2026-03-19T11:54:53.977610005Z priorityClassName: system-node-critical 2026-03-19T11:54:53.977610005Z tolerations: 2026-03-19T11:54:53.977610005Z - operator: "Exists" 2026-03-19T11:54:53.977610005Z volumes: 2026-03-19T11:54:53.977610005Z - hostPath: 2026-03-19T11:54:53.977610005Z path: /etc/kubernetes/manifests 2026-03-19T11:54:53.977610005Z name: static-pod-dir 2026-03-19T11:54:53.977610005Z - hostPath: 2026-03-19T11:54:53.977610005Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-19T11:54:53.977610005Z name: resource-dir 2026-03-19T11:54:53.977610005Z - hostPath: 2026-03-19T11:54:53.977610005Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-19T11:54:53.977610005Z name: cert-dir 2026-03-19T11:54:53.977610005Z - hostPath: 2026-03-19T11:54:53.977610005Z path: /var/lib/etcd 2026-03-19T11:54:53.977610005Z type: "" 2026-03-19T11:54:53.977610005Z name: data-dir 2026-03-19T11:54:53.977610005Z - hostPath: 2026-03-19T11:54:53.977610005Z path: /usr/local/bin 2026-03-19T11:54:53.977610005Z name: usr-local-bin 2026-03-19T11:54:53.977610005Z - hostPath: 2026-03-19T11:54:53.977610005Z path: /var/log/etcd 2026-03-19T11:54:53.977610005Z name: log-dir 2026-03-19T11:54:53.977610005Z - hostPath: 2026-03-19T11:54:53.977610005Z path: /etc/kubernetes 2026-03-19T11:54:53.977610005Z name: config-dir 2026-03-19T11:54:53.977610005Z - hostPath: 2026-03-19T11:54:53.977610005Z path: /var/lib/etcd-auto-backup 2026-03-19T11:54:53.977610005Z name: etcd-auto-backup-dir 2026-03-19T11:54:54.038576967Z I0319 11:54:54.038505 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-19T11:54:54.038882336Z I0319 11:54:54.038842 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-19T11:54:54.039032671Z I0319 11:54:54.038858 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-19T11:54:54.039032671Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000003076315156762311023512 0ustar00000000000000002026-03-19T11:55:43.282486754Z I0319 11:55:43.282173 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:55:43.284282671Z 2026/03/19 11:55:43 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:43.284325102Z 2026/03/19 11:55:43 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:44.285168904Z 2026/03/19 11:55:44 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:44.285168904Z 2026/03/19 11:55:44 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:45.898486335Z 2026/03/19 11:55:45 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:46.068438122Z 2026/03/19 11:55:46 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:48.511531663Z 2026/03/19 11:55:48 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:48.529017545Z 2026/03/19 11:55:48 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:52.061112203Z 2026/03/19 11:55:52 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:52.195076863Z 2026/03/19 11:55:52 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:53.283406647Z {"level":"warn","ts":"2026-03-19T11:55:53.283209Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc0003fa1e0/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-03-19T11:55:53.283536351Z E0319 11:55:53.283479 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:55:53.283536351Z E0319 11:55:53.283522 1 rev.go:176] could not reach any endpoint to get the raft index 2026-03-19T11:55:53.284514452Z 2026/03/19 11:55:53 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:54.286331525Z 2026/03/19 11:55:54 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:55.755571247Z 2026/03/19 11:55:55 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:58.404070645Z 2026/03/19 11:55:58 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:55:59.609774737Z 2026/03/19 11:55:59 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:02.989239785Z 2026/03/19 11:56:02 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:03.284294092Z {"level":"warn","ts":"2026-03-19T11:56:03.284075Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc0003fa1e0/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-03-19T11:56:03.284396955Z E0319 11:56:03.284287 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:56:03.284396955Z E0319 11:56:03.284313 1 rev.go:176] could not reach any endpoint to get the raft index 2026-03-19T11:56:03.285433858Z 2026/03/19 11:56:03 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:04.287593952Z 2026/03/19 11:56:04 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:06.023537514Z 2026/03/19 11:56:06 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:08.174555612Z 2026/03/19 11:56:08 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:10.104725769Z 2026/03/19 11:56:10 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:12.535772900Z 2026/03/19 11:56:12 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:13.285172733Z {"level":"warn","ts":"2026-03-19T11:56:13.284943Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc0003fa1e0/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-03-19T11:56:13.285172733Z E0319 11:56:13.285077 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:56:13.285172733Z E0319 11:56:13.285093 1 rev.go:176] could not reach any endpoint to get the raft index 2026-03-19T11:56:13.286087942Z 2026/03/19 11:56:13 WARNING: [core] [Channel #9 SubChannel #10]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:14.286862012Z 2026/03/19 11:56:14 WARNING: [core] [Channel #9 SubChannel #10]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:16.062597853Z 2026/03/19 11:56:16 WARNING: [core] [Channel #9 SubChannel #10]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:18.417760867Z 2026/03/19 11:56:18 WARNING: [core] [Channel #9 SubChannel #10]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:23.155289236Z 2026/03/19 11:56:23 WARNING: [core] [Channel #9 SubChannel #10]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:23.285985113Z {"level":"warn","ts":"2026-03-19T11:56:23.285874Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc0003fa1e0/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2026-03-19T11:56:23.286046264Z E0319 11:56:23.286031 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2026-03-19T11:56:23.286071025Z E0319 11:56:23.286051 1 rev.go:176] could not reach any endpoint to get the raft index 2026-03-19T11:56:23.286758427Z 2026/03/19 11:56:23 WARNING: [core] [Channel #11 SubChannel #12]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:24.287722334Z 2026/03/19 11:56:24 WARNING: [core] [Channel #11 SubChannel #12]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000002657015156762311024215 0ustar00000000000000002026-03-19T11:55:32.671121646Z I0319 11:55:32.670923 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-19T11:55:44.614392699Z I0319 11:55:44.614277 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:55:44.619006465Z 2026/03/19 11:55:44 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:55:45.621298823Z 2026/03/19 11:55:45 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:55:46.615668170Z W0319 11:55:46.615516 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: context deadline exceeded 2026-03-19T11:55:48.616119885Z I0319 11:55:48.615984 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:55:48.618221222Z 2026/03/19 11:55:48 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:55:49.619994794Z 2026/03/19 11:55:49 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:55:50.616770027Z W0319 11:55:50.616686 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: context deadline exceeded 2026-03-19T11:55:54.613937320Z I0319 11:55:54.613853 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:55:54.615582441Z 2026/03/19 11:55:54 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:55:54.617722460Z I0319 11:55:54.617631 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:55:54.620285980Z 2026/03/19 11:55:54 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:55:55.617933251Z 2026/03/19 11:55:55 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:55:55.622216597Z 2026/03/19 11:55:55 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:55:56.615182340Z W0319 11:55:56.615061 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: context deadline exceeded 2026-03-19T11:55:56.619387493Z W0319 11:55:56.619341 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: context deadline exceeded 2026-03-19T11:55:58.615863153Z I0319 11:55:58.615755 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:55:58.618316921Z 2026/03/19 11:55:58 WARNING: [core] [Channel #9 SubChannel #10]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:55:59.620970950Z 2026/03/19 11:55:59 WARNING: [core] [Channel #9 SubChannel #10]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:00.617093483Z W0319 11:56:00.617003 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: context deadline exceeded 2026-03-19T11:56:04.614959269Z I0319 11:56:04.614877 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:56:04.617307983Z I0319 11:56:04.617273 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:56:04.617569391Z 2026/03/19 11:56:04 WARNING: [core] [Channel #11 SubChannel #12]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:04.619393828Z 2026/03/19 11:56:04 WARNING: [core] [Channel #13 SubChannel #14]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:05.619421544Z 2026/03/19 11:56:05 WARNING: [core] [Channel #11 SubChannel #12]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:05.620082585Z 2026/03/19 11:56:05 WARNING: [core] [Channel #13 SubChannel #14]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:06.616378633Z W0319 11:56:06.616276 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: context deadline exceeded 2026-03-19T11:56:06.618561152Z W0319 11:56:06.618509 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: context deadline exceeded 2026-03-19T11:56:08.617085826Z I0319 11:56:08.617000 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:56:08.619292495Z 2026/03/19 11:56:08 WARNING: [core] [Channel #15 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:09.621205052Z 2026/03/19 11:56:09 WARNING: [core] [Channel #15 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:10.618482921Z W0319 11:56:10.618393 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: context deadline exceeded 2026-03-19T11:56:14.615095306Z I0319 11:56:14.615023 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:56:14.617417449Z 2026/03/19 11:56:14 WARNING: [core] [Channel #17 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:14.619580878Z I0319 11:56:14.619545 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:56:14.623477461Z 2026/03/19 11:56:14 WARNING: [core] [Channel #19 SubChannel #20]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:15.620041759Z 2026/03/19 11:56:15 WARNING: [core] [Channel #17 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:15.625005465Z 2026/03/19 11:56:15 WARNING: [core] [Channel #19 SubChannel #20]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:16.616226004Z W0319 11:56:16.616138 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: context deadline exceeded 2026-03-19T11:56:16.620555660Z W0319 11:56:16.620481 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: context deadline exceeded 2026-03-19T11:56:18.616513003Z I0319 11:56:18.616448 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:56:18.618243538Z 2026/03/19 11:56:18 WARNING: [core] [Channel #21 SubChannel #22]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:19.619770041Z 2026/03/19 11:56:19 WARNING: [core] [Channel #21 SubChannel #22]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp [::1]:2379: connect: connection refused" 2026-03-19T11:56:20.618046101Z W0319 11:56:20.617972 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: context deadline exceeded 2026-03-19T11:56:24.612561421Z I0319 11:56:24.612488 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:56:24.618138367Z I0319 11:56:24.618057 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:56:26.613485881Z W0319 11:56:26.613405 1 etcdcli_pool.go:73] could not create a new cached client after 0 tries, trying again. Err: context deadline exceeded 2026-03-19T11:56:26.613619975Z 2026/03/19 11:56:26 WARNING: [core] [Channel #23 SubChannel #24]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: authentication handshake failed: context canceled" 2026-03-19T11:56:26.619591604Z W0319 11:56:26.619545 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: context deadline exceeded 2026-03-19T11:56:26.619848592Z 2026/03/19 11:56:26 WARNING: [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "localhost:2379", ServerName: "localhost:2379", }. Err: connection error: desc = "transport: authentication handshake failed: context canceled" 2026-03-19T11:56:28.614032809Z I0319 11:56:28.613920 1 etcdcli_pool.go:70] creating a new cached client 2026-03-19T11:56:49.618842221Z I0319 11:56:49.618247 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000006461615156762311024370 0ustar00000000000000002026-03-19T11:55:30.621575473Z {"level":"info","ts":"2026-03-19T11:55:30.621391Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-19T11:55:30.623812103Z {"level":"info","ts":"2026-03-19T11:55:30.623702Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-19T11:55:30.624322209Z {"level":"info","ts":"2026-03-19T11:55:30.624244Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-19T11:55:30.624428962Z {"level":"info","ts":"2026-03-19T11:55:30.624383Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-19T11:55:30.624469134Z {"level":"info","ts":"2026-03-19T11:55:30.624445Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc000538000/192.168.32.10:9978\""} 2026-03-19T11:55:30.624529156Z {"level":"info","ts":"2026-03-19T11:55:30.624482Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc000538000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-19T11:55:30.624536816Z {"level":"info","ts":"2026-03-19T11:55:30.624525Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-19T11:55:30.624949079Z {"level":"info","ts":"2026-03-19T11:55:30.624894Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-19T11:55:30.625041642Z {"level":"info","ts":"2026-03-19T11:55:30.624977Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-19T11:55:30.625118874Z {"level":"info","ts":"2026-03-19T11:55:30.625087Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc00040a5c0 } }"} 2026-03-19T11:55:30.625148065Z {"level":"info","ts":"2026-03-19T11:55:30.625125Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-19T11:55:30.625194377Z {"level":"info","ts":"2026-03-19T11:55:30.625171Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-19T11:55:30.625222148Z {"level":"info","ts":"2026-03-19T11:55:30.625194Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-19T11:55:30.625475296Z {"level":"info","ts":"2026-03-19T11:55:30.625361Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-19T11:55:30.625565338Z {"level":"info","ts":"2026-03-19T11:55:30.625490Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-19T11:55:30.625765785Z {"level":"info","ts":"2026-03-19T11:55:30.625659Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, CONNECTING"} 2026-03-19T11:55:30.626240379Z {"level":"info","ts":"2026-03-19T11:55:30.626150Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:30.626310271Z {"level":"warn","ts":"2026-03-19T11:55:30.626246Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:30.626394454Z {"level":"info","ts":"2026-03-19T11:55:30.626323Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:30.626484747Z {"level":"info","ts":"2026-03-19T11:55:30.626416Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, TRANSIENT_FAILURE"} 2026-03-19T11:55:30.626528768Z {"level":"info","ts":"2026-03-19T11:55:30.626494Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-19T11:55:30.626559799Z {"level":"info","ts":"2026-03-19T11:55:30.626514Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-19T11:55:30.626608780Z {"level":"info","ts":"2026-03-19T11:55:30.626591Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-19T11:55:30.627028534Z {"level":"info","ts":"2026-03-19T11:55:30.626985Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-19T11:55:30.627045264Z {"level":"info","ts":"2026-03-19T11:55:30.627014Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-19T11:55:30.627045264Z {"level":"info","ts":"2026-03-19T11:55:30.627033Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-19T11:55:30.627068045Z {"level":"info","ts":"2026-03-19T11:55:30.627042Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-19T11:55:30.627262161Z {"level":"info","ts":"2026-03-19T11:55:30.627232Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-19T11:55:31.627322783Z {"level":"info","ts":"2026-03-19T11:55:31.627143Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:31.627322783Z {"level":"info","ts":"2026-03-19T11:55:31.627253Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, IDLE"} 2026-03-19T11:55:31.627415646Z {"level":"info","ts":"2026-03-19T11:55:31.627332Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-19T11:55:31.627415646Z {"level":"info","ts":"2026-03-19T11:55:31.627394Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-19T11:55:31.627614293Z {"level":"info","ts":"2026-03-19T11:55:31.627543Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, CONNECTING"} 2026-03-19T11:55:31.628572412Z {"level":"info","ts":"2026-03-19T11:55:31.627963Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:31.628572412Z {"level":"warn","ts":"2026-03-19T11:55:31.628035Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:31.628572412Z {"level":"info","ts":"2026-03-19T11:55:31.628077Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:31.628572412Z {"level":"info","ts":"2026-03-19T11:55:31.628109Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, TRANSIENT_FAILURE"} 2026-03-19T11:55:32.992582773Z {"level":"info","ts":"2026-03-19T11:55:32.992500Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:32.992615524Z {"level":"info","ts":"2026-03-19T11:55:32.992578Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, IDLE"} 2026-03-19T11:55:32.992686127Z {"level":"info","ts":"2026-03-19T11:55:32.992624Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-19T11:55:32.992694597Z {"level":"info","ts":"2026-03-19T11:55:32.992680Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-19T11:55:32.992888023Z {"level":"info","ts":"2026-03-19T11:55:32.992849Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, CONNECTING"} 2026-03-19T11:55:32.993046238Z {"level":"info","ts":"2026-03-19T11:55:32.993017Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:32.993056598Z {"level":"warn","ts":"2026-03-19T11:55:32.993045Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:32.993073089Z {"level":"info","ts":"2026-03-19T11:55:32.993063Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:32.993096460Z {"level":"info","ts":"2026-03-19T11:55:32.993079Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, TRANSIENT_FAILURE"} 2026-03-19T11:55:35.678286628Z {"level":"info","ts":"2026-03-19T11:55:35.677928Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:35.678286628Z {"level":"info","ts":"2026-03-19T11:55:35.678229Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, IDLE"} 2026-03-19T11:55:35.678361730Z {"level":"info","ts":"2026-03-19T11:55:35.678268Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-19T11:55:35.678361730Z {"level":"info","ts":"2026-03-19T11:55:35.678296Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-19T11:55:35.678470724Z {"level":"info","ts":"2026-03-19T11:55:35.678412Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, CONNECTING"} 2026-03-19T11:55:35.678836566Z {"level":"info","ts":"2026-03-19T11:55:35.678724Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:35.678836566Z {"level":"warn","ts":"2026-03-19T11:55:35.678769Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:35.678866017Z {"level":"info","ts":"2026-03-19T11:55:35.678830Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:35.678879197Z {"level":"info","ts":"2026-03-19T11:55:35.678859Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, TRANSIENT_FAILURE"} 2026-03-19T11:55:40.108111653Z {"level":"info","ts":"2026-03-19T11:55:40.107982Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:40.108111653Z {"level":"info","ts":"2026-03-19T11:55:40.108065Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, IDLE"} 2026-03-19T11:55:40.108173465Z {"level":"info","ts":"2026-03-19T11:55:40.108104Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-19T11:55:40.108173465Z {"level":"info","ts":"2026-03-19T11:55:40.108139Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-19T11:55:40.108403951Z {"level":"info","ts":"2026-03-19T11:55:40.108311Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, CONNECTING"} 2026-03-19T11:55:40.108606597Z {"level":"info","ts":"2026-03-19T11:55:40.108530Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:40.108606597Z {"level":"warn","ts":"2026-03-19T11:55:40.108586Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:40.108622998Z {"level":"info","ts":"2026-03-19T11:55:40.108610Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:40.108685760Z {"level":"info","ts":"2026-03-19T11:55:40.108646Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, TRANSIENT_FAILURE"} 2026-03-19T11:55:46.574416168Z {"level":"info","ts":"2026-03-19T11:55:46.574285Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:46.574416168Z {"level":"info","ts":"2026-03-19T11:55:46.574389Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, IDLE"} 2026-03-19T11:55:46.574634475Z {"level":"info","ts":"2026-03-19T11:55:46.574439Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-19T11:55:46.574634475Z {"level":"info","ts":"2026-03-19T11:55:46.574492Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-19T11:55:46.574772099Z {"level":"info","ts":"2026-03-19T11:55:46.574662Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, CONNECTING"} 2026-03-19T11:55:46.575098650Z {"level":"info","ts":"2026-03-19T11:55:46.575031Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:46.575098650Z {"level":"warn","ts":"2026-03-19T11:55:46.575078Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:46.575145581Z {"level":"info","ts":"2026-03-19T11:55:46.575116Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:46.575175742Z {"level":"info","ts":"2026-03-19T11:55:46.575153Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, TRANSIENT_FAILURE"} 2026-03-19T11:55:59.167468851Z {"level":"info","ts":"2026-03-19T11:55:59.167276Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:59.167468851Z {"level":"info","ts":"2026-03-19T11:55:59.167365Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, IDLE"} 2026-03-19T11:55:59.167468851Z {"level":"info","ts":"2026-03-19T11:55:59.167403Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-19T11:55:59.167468851Z {"level":"info","ts":"2026-03-19T11:55:59.167437Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-19T11:55:59.167690017Z {"level":"info","ts":"2026-03-19T11:55:59.167601Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, CONNECTING"} 2026-03-19T11:55:59.167714907Z {"level":"info","ts":"2026-03-19T11:55:59.167689Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:59.167734698Z {"level":"warn","ts":"2026-03-19T11:55:59.167712Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:59.167754239Z {"level":"info","ts":"2026-03-19T11:55:59.167730Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:55:59.167773249Z {"level":"info","ts":"2026-03-19T11:55:59.167755Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, TRANSIENT_FAILURE"} 2026-03-19T11:56:14.774519970Z {"level":"info","ts":"2026-03-19T11:56:14.774385Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:56:14.774519970Z {"level":"info","ts":"2026-03-19T11:56:14.774482Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, IDLE"} 2026-03-19T11:56:14.774599483Z {"level":"info","ts":"2026-03-19T11:56:14.774521Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-19T11:56:14.774599483Z {"level":"info","ts":"2026-03-19T11:56:14.774563Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-19T11:56:14.774903253Z {"level":"info","ts":"2026-03-19T11:56:14.774748Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, CONNECTING"} 2026-03-19T11:56:14.774964375Z {"level":"info","ts":"2026-03-19T11:56:14.774916Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:56:14.774976965Z {"level":"warn","ts":"2026-03-19T11:56:14.774950Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:56:14.775009776Z {"level":"info","ts":"2026-03-19T11:56:14.774982Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:56:14.775009776Z {"level":"info","ts":"2026-03-19T11:56:14.775002Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, TRANSIENT_FAILURE"} 2026-03-19T11:56:40.912261585Z {"level":"info","ts":"2026-03-19T11:56:40.912117Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-19T11:56:40.912261585Z {"level":"info","ts":"2026-03-19T11:56:40.912203Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, IDLE"} 2026-03-19T11:56:40.912332978Z {"level":"info","ts":"2026-03-19T11:56:40.912252Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-19T11:56:40.912332978Z {"level":"info","ts":"2026-03-19T11:56:40.912308Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-19T11:56:40.912511143Z {"level":"info","ts":"2026-03-19T11:56:40.912417Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, CONNECTING"} 2026-03-19T11:56:40.920099894Z {"level":"info","ts":"2026-03-19T11:56:40.920026Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-19T11:56:40.920119384Z {"level":"info","ts":"2026-03-19T11:56:40.920098Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00041ef90, READY"} 2026-03-19T11:56:40.920181176Z {"level":"info","ts":"2026-03-19T11:56:40.920151Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-19T11:56:40.920181176Z {"level":"info","ts":"2026-03-19T11:56:40.920174Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013065715156762311022723 0ustar00000000000000002026-03-19T11:57:49.461077758Z {"level":"info","ts":"2026-03-19T11:57:49.459401Z","caller":"traceutil/trace.go:171","msg":"trace[1181000636] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-kni-infra; range_end:; response_count:1; response_revision:10869; }","duration":"639.553545ms","start":"2026-03-19T11:57:48.819841Z","end":"2026-03-19T11:57:49.459394Z","steps":["trace[1181000636] 'agreement among raft nodes before linearized reading' (duration: 639.509383ms)"],"step_count":1} 2026-03-19T11:57:49.461077758Z {"level":"warn","ts":"2026-03-19T11:57:49.459419Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:48.819833Z","time spent":"639.581545ms","remote":"[::1]:45352","response type":"/etcdserverpb.KV/Range","request count":0,"request size":47,"response count":1,"response size":1870,"request content":"key:\"/kubernetes.io/namespaces/openshift-kni-infra\" "} 2026-03-19T11:57:49.461077758Z {"level":"warn","ts":"2026-03-19T11:57:49.459490Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"513.966149ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolenotifications.console.openshift.io\" ","response":"range_response_count:1 size:5417"} 2026-03-19T11:57:49.461077758Z {"level":"info","ts":"2026-03-19T11:57:49.459513Z","caller":"traceutil/trace.go:171","msg":"trace[947413459] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolenotifications.console.openshift.io; range_end:; response_count:1; response_revision:10869; }","duration":"514.01349ms","start":"2026-03-19T11:57:48.945492Z","end":"2026-03-19T11:57:49.459506Z","steps":["trace[947413459] 'agreement among raft nodes before linearized reading' (duration: 513.967039ms)"],"step_count":1} 2026-03-19T11:57:49.461077758Z {"level":"warn","ts":"2026-03-19T11:57:49.459533Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:48.945475Z","time spent":"514.051602ms","remote":"[::1]:54764","response type":"/etcdserverpb.KV/Range","request count":0,"request size":105,"response count":1,"response size":5441,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolenotifications.console.openshift.io\" "} 2026-03-19T11:57:49.461077758Z {"level":"warn","ts":"2026-03-19T11:57:49.459538Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"654.816707ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-machine-config-operator/machine-config-daemon\" ","response":"range_response_count:1 size:740"} 2026-03-19T11:57:49.461077758Z {"level":"info","ts":"2026-03-19T11:57:49.459561Z","caller":"traceutil/trace.go:171","msg":"trace[840037191] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-machine-config-operator/machine-config-daemon; range_end:; response_count:1; response_revision:10869; }","duration":"654.90281ms","start":"2026-03-19T11:57:48.804651Z","end":"2026-03-19T11:57:49.459554Z","steps":["trace[840037191] 'agreement among raft nodes before linearized reading' (duration: 654.855278ms)"],"step_count":1} 2026-03-19T11:57:49.461077758Z {"level":"warn","ts":"2026-03-19T11:57:49.459636Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"539.69034ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-kube-apiserver/prometheus-k8s\" ","response":"range_response_count:1 size:864"} 2026-03-19T11:57:49.461077758Z {"level":"info","ts":"2026-03-19T11:57:49.459658Z","caller":"traceutil/trace.go:171","msg":"trace[1795801600] range","detail":"{range_begin:/kubernetes.io/roles/openshift-kube-apiserver/prometheus-k8s; range_end:; response_count:1; response_revision:10869; }","duration":"539.738122ms","start":"2026-03-19T11:57:48.919913Z","end":"2026-03-19T11:57:49.459651Z","steps":["trace[1795801600] 'agreement among raft nodes before linearized reading' (duration: 539.695001ms)"],"step_count":1} 2026-03-19T11:57:49.461077758Z {"level":"warn","ts":"2026-03-19T11:57:49.459679Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:48.919899Z","time spent":"539.775574ms","remote":"[::1]:54436","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":888,"request content":"key:\"/kubernetes.io/roles/openshift-kube-apiserver/prometheus-k8s\" "} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.459827Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"563.825712ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-kube-controller-manager/prometheus-k8s\" ","response":"range_response_count:1 size:1180"} 2026-03-19T11:57:49.461097458Z {"level":"info","ts":"2026-03-19T11:57:49.459851Z","caller":"traceutil/trace.go:171","msg":"trace[1957286902] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-kube-controller-manager/prometheus-k8s; range_end:; response_count:1; response_revision:10869; }","duration":"563.882644ms","start":"2026-03-19T11:57:48.895961Z","end":"2026-03-19T11:57:49.459844Z","steps":["trace[1957286902] 'agreement among raft nodes before linearized reading' (duration: 563.816122ms)"],"step_count":1} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.459867Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:48.895943Z","time spent":"563.919706ms","remote":"[::1]:54192","response type":"/etcdserverpb.KV/Range","request count":0,"request size":78,"response count":1,"response size":1204,"request content":"key:\"/kubernetes.io/rolebindings/openshift-kube-controller-manager/prometheus-k8s\" "} 2026-03-19T11:57:49.461097458Z {"level":"info","ts":"2026-03-19T11:57:49.458910Z","caller":"traceutil/trace.go:171","msg":"trace[827110714] range","detail":"{range_begin:/kubernetes.io/pods/openshift-monitoring/node-exporter-lpndz; range_end:; response_count:1; response_revision:10869; }","duration":"365.715098ms","start":"2026-03-19T11:57:49.093187Z","end":"2026-03-19T11:57:49.458902Z","steps":["trace[827110714] 'agreement among raft nodes before linearized reading' (duration: 365.661686ms)"],"step_count":1} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.459967Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:49.093168Z","time spent":"366.792262ms","remote":"[::1]:54170","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":12362,"request content":"key:\"/kubernetes.io/pods/openshift-monitoring/node-exporter-lpndz\" "} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.458947Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:49.120585Z","time spent":"338.358663ms","remote":"[::1]:45310","response type":"/etcdserverpb.KV/Range","request count":0,"request size":69,"response count":1,"response size":1943,"request content":"key:\"/kubernetes.io/services/specs/openshift-service-ca-operator/metrics\" "} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.460118Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"289.117569ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/services/specs/openshift-network-operator/metrics\" ","response":"range_response_count:1 size:1823"} 2026-03-19T11:57:49.461097458Z {"level":"info","ts":"2026-03-19T11:57:49.460153Z","caller":"traceutil/trace.go:171","msg":"trace[1150357088] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-network-operator/metrics; range_end:; response_count:1; response_revision:10869; }","duration":"289.17197ms","start":"2026-03-19T11:57:49.170970Z","end":"2026-03-19T11:57:49.460142Z","steps":["trace[1150357088] 'agreement among raft nodes before linearized reading' (duration: 289.097477ms)"],"step_count":1} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.459115Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:49.026148Z","time spent":"432.960912ms","remote":"[::1]:54360","response type":"/etcdserverpb.KV/Range","request count":0,"request size":104,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/ipam.cluster.x-k8s.io/ipaddresses/\" range_end:\"/kubernetes.io/ipam.cluster.x-k8s.io/ipaddresses0\" count_only:true "} 2026-03-19T11:57:49.461097458Z {"level":"info","ts":"2026-03-19T11:57:49.460202Z","caller":"traceutil/trace.go:171","msg":"trace[23110873] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-machine-api/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:10869; }","duration":"165.575278ms","start":"2026-03-19T11:57:49.294611Z","end":"2026-03-19T11:57:49.460186Z","steps":["trace[23110873] 'agreement among raft nodes before linearized reading' (duration: 165.522606ms)"],"step_count":1} 2026-03-19T11:57:49.461097458Z {"level":"info","ts":"2026-03-19T11:57:49.460305Z","caller":"traceutil/trace.go:171","msg":"trace[915123373] range","detail":"{range_begin:/kubernetes.io/roles/openshift-config-managed/machine-approver; range_end:; response_count:1; response_revision:10869; }","duration":"189.333398ms","start":"2026-03-19T11:57:49.270962Z","end":"2026-03-19T11:57:49.460296Z","steps":["trace[915123373] 'agreement among raft nodes before linearized reading' (duration: 189.309607ms)"],"step_count":1} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.460345Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"278.494233ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/minions/master-0\" ","response":"range_response_count:1 size:12382"} 2026-03-19T11:57:49.461097458Z {"level":"info","ts":"2026-03-19T11:57:49.460375Z","caller":"traceutil/trace.go:171","msg":"trace[159190927] range","detail":"{range_begin:/kubernetes.io/minions/master-0; range_end:; response_count:1; response_revision:10869; }","duration":"278.523224ms","start":"2026-03-19T11:57:49.181844Z","end":"2026-03-19T11:57:49.460367Z","steps":["trace[159190927] 'agreement among raft nodes before linearized reading' (duration: 278.465372ms)"],"step_count":1} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.460424Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"281.055284ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-cluster-storage-operator/csi-snapshot-controller\" ","response":"range_response_count:1 size:3714"} 2026-03-19T11:57:49.461097458Z {"level":"info","ts":"2026-03-19T11:57:49.460447Z","caller":"traceutil/trace.go:171","msg":"trace[1879740874] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cluster-storage-operator/csi-snapshot-controller; range_end:; response_count:1; response_revision:10869; }","duration":"281.087175ms","start":"2026-03-19T11:57:49.179352Z","end":"2026-03-19T11:57:49.460439Z","steps":["trace[1879740874] 'agreement among raft nodes before linearized reading' (duration: 281.040454ms)"],"step_count":1} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.460509Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"215.533615ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-machine-api/control-plane-machine-set-operator\" ","response":"range_response_count:1 size:993"} 2026-03-19T11:57:49.461097458Z {"level":"warn","ts":"2026-03-19T11:57:49.460520Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"265.41817ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/installplans.operators.coreos.com\" ","response":"range_response_count:1 size:12201"} 2026-03-19T11:57:49.461097458Z {"level":"info","ts":"2026-03-19T11:57:49.460535Z","caller":"traceutil/trace.go:171","msg":"trace[1406289727] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-machine-api/control-plane-machine-set-operator; range_end:; response_count:1; response_revision:10869; }","duration":"215.587597ms","start":"2026-03-19T11:57:49.244941Z","end":"2026-03-19T11:57:49.460528Z","steps":["trace[1406289727] 'agreement among raft nodes before linearized reading' (duration: 215.539416ms)"],"step_count":1} 2026-03-19T11:57:49.461097458Z {"level":"info","ts":"2026-03-19T11:57:49.460549Z","caller":"traceutil/trace.go:171","msg":"trace[1707110232] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/installplans.operators.coreos.com; range_end:; response_count:1; response_revision:10869; }","duration":"265.480012ms","start":"2026-03-19T11:57:49.195060Z","end":"2026-03-19T11:57:49.460540Z","steps":["trace[1707110232] 'agreement among raft nodes before linearized reading' (duration: 265.421981ms)"],"step_count":1} 2026-03-19T11:57:49.461116099Z {"level":"warn","ts":"2026-03-19T11:57:49.460643Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"240.575567ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-etcd-operator/etcd-operator-config\" ","response":"range_response_count:1 size:895"} 2026-03-19T11:57:49.461116099Z {"level":"warn","ts":"2026-03-19T11:57:49.460648Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"275.946583ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/ingresses/cluster\" ","response":"range_response_count:1 size:886"} 2026-03-19T11:57:49.461116099Z {"level":"info","ts":"2026-03-19T11:57:49.460663Z","caller":"traceutil/trace.go:171","msg":"trace[1630949244] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-etcd-operator/etcd-operator-config; range_end:; response_count:1; response_revision:10869; }","duration":"240.617627ms","start":"2026-03-19T11:57:49.220037Z","end":"2026-03-19T11:57:49.460655Z","steps":["trace[1630949244] 'agreement among raft nodes before linearized reading' (duration: 240.582596ms)"],"step_count":1} 2026-03-19T11:57:49.461116099Z {"level":"info","ts":"2026-03-19T11:57:49.460667Z","caller":"traceutil/trace.go:171","msg":"trace[138244823] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/ingresses/cluster; range_end:; response_count:1; response_revision:10869; }","duration":"275.981684ms","start":"2026-03-19T11:57:49.184680Z","end":"2026-03-19T11:57:49.460661Z","steps":["trace[138244823] 'agreement among raft nodes before linearized reading' (duration: 275.942043ms)"],"step_count":1} 2026-03-19T11:57:49.461116099Z {"level":"info","ts":"2026-03-19T11:57:49.460647Z","caller":"traceutil/trace.go:171","msg":"trace[624386936] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-config-managed/cloud-credential-operator; range_end:; response_count:1; response_revision:10869; }","duration":"115.068083ms","start":"2026-03-19T11:57:49.345560Z","end":"2026-03-19T11:57:49.460628Z","steps":["trace[624386936] 'agreement among raft nodes before linearized reading' (duration: 115.023972ms)"],"step_count":1} 2026-03-19T11:57:49.461116099Z {"level":"warn","ts":"2026-03-19T11:57:49.460703Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"286.654501ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-operators\" ","response":"range_response_count:1 size:1010"} 2026-03-19T11:57:49.461116099Z {"level":"info","ts":"2026-03-19T11:57:49.460723Z","caller":"traceutil/trace.go:171","msg":"trace[1301399339] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-operators; range_end:; response_count:1; response_revision:10869; }","duration":"286.688282ms","start":"2026-03-19T11:57:49.174028Z","end":"2026-03-19T11:57:49.460716Z","steps":["trace[1301399339] 'agreement among raft nodes before linearized reading' (duration: 286.652531ms)"],"step_count":1} 2026-03-19T11:57:49.461116099Z {"level":"warn","ts":"2026-03-19T11:57:49.460751Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"265.369679ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusterversions/version\" ","response":"range_response_count:1 size:5413"} 2026-03-19T11:57:49.461116099Z {"level":"info","ts":"2026-03-19T11:57:49.460768Z","caller":"traceutil/trace.go:171","msg":"trace[1925643079] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10869; }","duration":"265.424351ms","start":"2026-03-19T11:57:49.195339Z","end":"2026-03-19T11:57:49.460763Z","steps":["trace[1925643079] 'agreement among raft nodes before linearized reading' (duration: 265.387689ms)"],"step_count":1} 2026-03-19T11:57:49.461116099Z {"level":"info","ts":"2026-03-19T11:57:49.460775Z","caller":"traceutil/trace.go:171","msg":"trace[2002295504] range","detail":"{range_begin:/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s; range_end:; response_count:1; response_revision:10869; }","duration":"140.117385ms","start":"2026-03-19T11:57:49.320648Z","end":"2026-03-19T11:57:49.460765Z","steps":["trace[2002295504] 'agreement among raft nodes before linearized reading' (duration: 140.098114ms)"],"step_count":1} 2026-03-19T11:57:49.461116099Z {"level":"warn","ts":"2026-03-19T11:57:49.460665Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"284.006247ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/events/openshift-apiserver/\" range_end:\"/kubernetes.io/events/openshift-apiserver0\" ","response":"range_response_count:24 size:20073"} 2026-03-19T11:57:49.461116099Z {"level":"info","ts":"2026-03-19T11:57:49.460836Z","caller":"traceutil/trace.go:171","msg":"trace[1100791816] range","detail":"{range_begin:/kubernetes.io/events/openshift-apiserver/; range_end:/kubernetes.io/events/openshift-apiserver0; response_count:24; response_revision:10869; }","duration":"284.189323ms","start":"2026-03-19T11:57:49.176639Z","end":"2026-03-19T11:57:49.460828Z","steps":["trace[1100791816] 'agreement among raft nodes before linearized reading' (duration: 283.903644ms)"],"step_count":1} 2026-03-19T11:57:49.461116099Z {"level":"warn","ts":"2026-03-19T11:57:49.460859Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"289.660355ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace\" ","response":"range_response_count:1 size:1024"} 2026-03-19T11:57:49.461116099Z {"level":"info","ts":"2026-03-19T11:57:49.460886Z","caller":"traceutil/trace.go:171","msg":"trace[105085634] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace; range_end:; response_count:1; response_revision:10869; }","duration":"289.693736ms","start":"2026-03-19T11:57:49.171183Z","end":"2026-03-19T11:57:49.460876Z","steps":["trace[105085634] 'agreement among raft nodes before linearized reading' (duration: 289.648255ms)"],"step_count":1} 2026-03-19T11:57:49.461272234Z {"level":"info","ts":"2026-03-19T11:57:49.458580Z","caller":"traceutil/trace.go:171","msg":"trace[333798940] transaction","detail":"{read_only:false; response_revision:10867; number_of_response:1; }","duration":"348.089972ms","start":"2026-03-19T11:57:49.110458Z","end":"2026-03-19T11:57:49.458548Z","steps":["trace[333798940] 'process raft request' (duration: 163.988319ms)","trace[333798940] 'compare' (duration: 183.947338ms)"],"step_count":2} 2026-03-19T11:57:49.463786463Z {"level":"warn","ts":"2026-03-19T11:57:49.461289Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:49.110444Z","time spent":"350.791877ms","remote":"[::1]:45142","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":759,"response count":0,"response size":40,"request content":"compare: success:> failure:<>"} 2026-03-19T11:57:49.466734456Z {"level":"warn","ts":"2026-03-19T11:57:49.466637Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:48.804643Z","time spent":"661.954992ms","remote":"[::1]:45272","response type":"/etcdserverpb.KV/Range","request count":0,"request size":88,"response count":1,"response size":764,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-machine-config-operator/machine-config-daemon\" "} 2026-03-19T11:57:50.571583982Z {"level":"info","ts":"2026-03-19T11:57:50.571484Z","caller":"traceutil/trace.go:171","msg":"trace[537585969] transaction","detail":"{read_only:false; response_revision:10909; number_of_response:1; }","duration":"110.426216ms","start":"2026-03-19T11:57:50.461032Z","end":"2026-03-19T11:57:50.571458Z","steps":["trace[537585969] 'process raft request' (duration: 108.873388ms)"],"step_count":1} 2026-03-19T11:57:50.571583982Z {"level":"info","ts":"2026-03-19T11:57:50.571521Z","caller":"traceutil/trace.go:171","msg":"trace[1128411856] linearizableReadLoop","detail":"{readStateIndex:11421; appliedIndex:11420; }","duration":"100.363039ms","start":"2026-03-19T11:57:50.471145Z","end":"2026-03-19T11:57:50.571508Z","steps":["trace[1128411856] 'read index received' (duration: 98.771939ms)","trace[1128411856] 'applied index is now lower than readState.Index' (duration: 1.59048ms)"],"step_count":2} 2026-03-19T11:57:50.583552711Z {"level":"info","ts":"2026-03-19T11:57:50.583111Z","caller":"traceutil/trace.go:171","msg":"trace[2102138385] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-machine-api-gcp; range_end:; response_count:1; response_revision:10909; }","duration":"111.978076ms","start":"2026-03-19T11:57:50.471116Z","end":"2026-03-19T11:57:50.583094Z","steps":["trace[2102138385] 'agreement among raft nodes before linearized reading' (duration: 100.463892ms)"],"step_count":1} 2026-03-19T11:57:51.258045278Z {"level":"warn","ts":"2026-03-19T11:57:51.257933Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"462.428741ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-namespace\" ","response":"range_response_count:1 size:103206"} 2026-03-19T11:57:51.258045278Z {"level":"warn","ts":"2026-03-19T11:57:51.257992Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"398.691828ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" ","response":"range_response_count:1 size:2511"} 2026-03-19T11:57:51.258090869Z {"level":"info","ts":"2026-03-19T11:57:51.258037Z","caller":"traceutil/trace.go:171","msg":"trace[1248380247] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:10914; }","duration":"398.75828ms","start":"2026-03-19T11:57:50.859264Z","end":"2026-03-19T11:57:51.258023Z","steps":["trace[1248380247] 'range keys from in-memory index tree' (duration: 398.595445ms)"],"step_count":1} 2026-03-19T11:57:51.258090869Z {"level":"info","ts":"2026-03-19T11:57:51.258031Z","caller":"traceutil/trace.go:171","msg":"trace[631263354] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-namespace; range_end:; response_count:1; response_revision:10914; }","duration":"462.562716ms","start":"2026-03-19T11:57:50.795445Z","end":"2026-03-19T11:57:51.258007Z","steps":["trace[631263354] 'range keys from in-memory index tree' (duration: 462.180504ms)"],"step_count":1} 2026-03-19T11:57:51.258090869Z {"level":"warn","ts":"2026-03-19T11:57:51.258062Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.859247Z","time spent":"398.810702ms","remote":"[::1]:45352","response type":"/etcdserverpb.KV/Range","request count":0,"request size":49,"response count":1,"response size":2535,"request content":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" "} 2026-03-19T11:57:51.258103260Z {"level":"warn","ts":"2026-03-19T11:57:51.258078Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.795430Z","time spent":"462.637929ms","remote":"[::1]:45356","response type":"/etcdserverpb.KV/Range","request count":0,"request size":86,"response count":1,"response size":103230,"request content":"key:\"/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-namespace\" "} 2026-03-19T11:57:51.258159542Z {"level":"warn","ts":"2026-03-19T11:57:51.258133Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"460.619023ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-19T11:57:51.258204863Z {"level":"info","ts":"2026-03-19T11:57:51.258184Z","caller":"traceutil/trace.go:171","msg":"trace[1950909105] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10914; }","duration":"460.685136ms","start":"2026-03-19T11:57:50.797491Z","end":"2026-03-19T11:57:51.258176Z","steps":["trace[1950909105] 'range keys from in-memory index tree' (duration: 460.588773ms)"],"step_count":1} 2026-03-19T11:57:51.258254755Z {"level":"warn","ts":"2026-03-19T11:57:51.258233Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.797484Z","time spent":"460.740978ms","remote":"[::1]:45272","response type":"/etcdserverpb.KV/Range","request count":0,"request size":34,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/serviceaccounts\" limit:1 "} 2026-03-19T11:57:51.258357258Z {"level":"warn","ts":"2026-03-19T11:57:51.257948Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"404.564594ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6\" ","response":"range_response_count:1 size:11446"} 2026-03-19T11:57:51.258400729Z {"level":"warn","ts":"2026-03-19T11:57:51.258297Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"387.666491ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:operator:kube-storage-version-migrator-operator\" ","response":"range_response_count:1 size:1167"} 2026-03-19T11:57:51.258442041Z {"level":"info","ts":"2026-03-19T11:57:51.258409Z","caller":"traceutil/trace.go:171","msg":"trace[2031324695] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:kube-storage-version-migrator-operator; range_end:; response_count:1; response_revision:10914; }","duration":"387.821125ms","start":"2026-03-19T11:57:50.870570Z","end":"2026-03-19T11:57:51.258391Z","steps":["trace[2031324695] 'range keys from in-memory index tree' (duration: 387.579148ms)"],"step_count":1} 2026-03-19T11:57:51.258471562Z {"level":"warn","ts":"2026-03-19T11:57:51.258442Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.870554Z","time spent":"387.879507ms","remote":"[::1]:54554","response type":"/etcdserverpb.KV/Range","request count":0,"request size":101,"response count":1,"response size":1191,"request content":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:operator:kube-storage-version-migrator-operator\" "} 2026-03-19T11:57:51.258471562Z {"level":"info","ts":"2026-03-19T11:57:51.258394Z","caller":"traceutil/trace.go:171","msg":"trace[1752156421] range","detail":"{range_begin:/kubernetes.io/pods/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6; range_end:; response_count:1; response_revision:10914; }","duration":"405.043279ms","start":"2026-03-19T11:57:50.853316Z","end":"2026-03-19T11:57:51.258360Z","steps":["trace[1752156421] 'range keys from in-memory index tree' (duration: 404.455761ms)"],"step_count":1} 2026-03-19T11:57:51.258547664Z {"level":"warn","ts":"2026-03-19T11:57:51.258499Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.853301Z","time spent":"405.181564ms","remote":"[::1]:54170","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":11470,"request content":"key:\"/kubernetes.io/pods/openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6\" "} 2026-03-19T11:57:51.258560744Z {"level":"warn","ts":"2026-03-19T11:57:51.258202Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"363.505158ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-authentication-operator/authentication-operator\" ","response":"range_response_count:1 size:1967"} 2026-03-19T11:57:51.258691179Z {"level":"info","ts":"2026-03-19T11:57:51.258601Z","caller":"traceutil/trace.go:171","msg":"trace[1830289163] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-authentication-operator/authentication-operator; range_end:; response_count:1; response_revision:10914; }","duration":"363.925212ms","start":"2026-03-19T11:57:50.894640Z","end":"2026-03-19T11:57:51.258565Z","steps":["trace[1830289163] 'range keys from in-memory index tree' (duration: 363.390534ms)"],"step_count":1} 2026-03-19T11:57:51.258750680Z {"level":"warn","ts":"2026-03-19T11:57:51.258709Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.894624Z","time spent":"364.051405ms","remote":"[::1]:54480","response type":"/etcdserverpb.KV/Range","request count":0,"request size":112,"response count":1,"response size":1991,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-authentication-operator/authentication-operator\" "} 2026-03-19T11:57:51.258780361Z {"level":"warn","ts":"2026-03-19T11:57:51.258287Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"436.527164ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/system:openshift:scc:hostnetwork-v2\" ","response":"range_response_count:1 size:1213"} 2026-03-19T11:57:51.258831793Z {"level":"info","ts":"2026-03-19T11:57:51.258783Z","caller":"traceutil/trace.go:171","msg":"trace[1472334675] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:scc:hostnetwork-v2; range_end:; response_count:1; response_revision:10914; }","duration":"437.03279ms","start":"2026-03-19T11:57:50.821740Z","end":"2026-03-19T11:57:51.258773Z","steps":["trace[1472334675] 'range keys from in-memory index tree' (duration: 436.450921ms)"],"step_count":1} 2026-03-19T11:57:51.258849334Z {"level":"warn","ts":"2026-03-19T11:57:51.258834Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.821721Z","time spent":"437.102632ms","remote":"[::1]:54556","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":1237,"request content":"key:\"/kubernetes.io/clusterroles/system:openshift:scc:hostnetwork-v2\" "} 2026-03-19T11:57:51.258928966Z {"level":"warn","ts":"2026-03-19T11:57:51.258319Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"413.458315ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/podmonitors.monitoring.coreos.com\" ","response":"range_response_count:1 size:36012"} 2026-03-19T11:57:51.258944467Z {"level":"info","ts":"2026-03-19T11:57:51.258919Z","caller":"traceutil/trace.go:171","msg":"trace[893962193] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/podmonitors.monitoring.coreos.com; range_end:; response_count:1; response_revision:10914; }","duration":"414.075444ms","start":"2026-03-19T11:57:50.844825Z","end":"2026-03-19T11:57:51.258901Z","steps":["trace[893962193] 'range keys from in-memory index tree' (duration: 413.376612ms)"],"step_count":1} 2026-03-19T11:57:51.259024039Z {"level":"warn","ts":"2026-03-19T11:57:51.258965Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.844809Z","time spent":"414.139867ms","remote":"[::1]:54764","response type":"/etcdserverpb.KV/Range","request count":0,"request size":97,"response count":1,"response size":36036,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/podmonitors.monitoring.coreos.com\" "} 2026-03-19T11:57:51.259124892Z {"level":"info","ts":"2026-03-19T11:57:51.259074Z","caller":"traceutil/trace.go:171","msg":"trace[1034991776] linearizableReadLoop","detail":"{readStateIndex:11429; appliedIndex:11428; }","duration":"339.763319ms","start":"2026-03-19T11:57:50.919303Z","end":"2026-03-19T11:57:51.259066Z","steps":["trace[1034991776] 'read index received' (duration: 336.123763ms)","trace[1034991776] 'applied index is now lower than readState.Index' (duration: 3.638866ms)"],"step_count":2} 2026-03-19T11:57:51.259163864Z {"level":"info","ts":"2026-03-19T11:57:51.259139Z","caller":"traceutil/trace.go:171","msg":"trace[1307885629] transaction","detail":"{read_only:false; response_revision:10915; number_of_response:1; }","duration":"348.850666ms","start":"2026-03-19T11:57:50.910283Z","end":"2026-03-19T11:57:51.259134Z","steps":["trace[1307885629] 'process raft request' (duration: 345.342905ms)"],"step_count":1} 2026-03-19T11:57:51.259231436Z {"level":"warn","ts":"2026-03-19T11:57:51.259205Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.910264Z","time spent":"348.892057ms","remote":"[::1]:42236","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":526,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-03-19T11:57:51.259302188Z {"level":"warn","ts":"2026-03-19T11:57:51.259275Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"339.18563ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolesamples.console.openshift.io\" ","response":"range_response_count:1 size:11255"} 2026-03-19T11:57:51.259357070Z {"level":"warn","ts":"2026-03-19T11:57:51.259320Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"340.012386ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-19T11:57:51.259370120Z {"level":"info","ts":"2026-03-19T11:57:51.259352Z","caller":"traceutil/trace.go:171","msg":"trace[923121262] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10915; }","duration":"340.087428ms","start":"2026-03-19T11:57:50.919257Z","end":"2026-03-19T11:57:51.259345Z","steps":["trace[923121262] 'agreement among raft nodes before linearized reading' (duration: 340.032327ms)"],"step_count":1} 2026-03-19T11:57:51.259406161Z {"level":"warn","ts":"2026-03-19T11:57:51.259375Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.919242Z","time spent":"340.12705ms","remote":"[::1]:45004","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 "} 2026-03-19T11:57:51.259457763Z {"level":"warn","ts":"2026-03-19T11:57:51.259422Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"239.40917ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-etcd-operator/etcd-service-ca-bundle\" ","response":"range_response_count:1 size:2605"} 2026-03-19T11:57:51.259469603Z {"level":"info","ts":"2026-03-19T11:57:51.259451Z","caller":"traceutil/trace.go:171","msg":"trace[1654918028] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-etcd-operator/etcd-service-ca-bundle; range_end:; response_count:1; response_revision:10915; }","duration":"239.464792ms","start":"2026-03-19T11:57:51.019979Z","end":"2026-03-19T11:57:51.259444Z","steps":["trace[1654918028] 'agreement among raft nodes before linearized reading' (duration: 239.40533ms)"],"step_count":1} 2026-03-19T11:57:51.259508325Z {"level":"info","ts":"2026-03-19T11:57:51.259304Z","caller":"traceutil/trace.go:171","msg":"trace[601083398] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-vsphere-infra; range_end:; response_count:1; response_revision:10915; }","duration":"164.885527ms","start":"2026-03-19T11:57:51.094401Z","end":"2026-03-19T11:57:51.259286Z","steps":["trace[601083398] 'agreement among raft nodes before linearized reading' (duration: 164.833945ms)"],"step_count":1} 2026-03-19T11:57:51.259559656Z {"level":"warn","ts":"2026-03-19T11:57:51.259533Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"264.622936ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/system:openshift:controller:machine-approver\" ","response":"range_response_count:1 size:1737"} 2026-03-19T11:57:51.259615128Z {"level":"info","ts":"2026-03-19T11:57:51.259333Z","caller":"traceutil/trace.go:171","msg":"trace[169869545] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolesamples.console.openshift.io; range_end:; response_count:1; response_revision:10915; }","duration":"339.258653ms","start":"2026-03-19T11:57:50.920061Z","end":"2026-03-19T11:57:51.259320Z","steps":["trace[169869545] 'agreement among raft nodes before linearized reading' (duration: 339.147469ms)"],"step_count":1} 2026-03-19T11:57:51.259649429Z {"level":"warn","ts":"2026-03-19T11:57:51.259617Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.920048Z","time spent":"339.560912ms","remote":"[::1]:54764","response type":"/etcdserverpb.KV/Range","request count":0,"request size":99,"response count":1,"response size":11279,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolesamples.console.openshift.io\" "} 2026-03-19T11:57:51.259675080Z {"level":"info","ts":"2026-03-19T11:57:51.259591Z","caller":"traceutil/trace.go:171","msg":"trace[1438990454] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:controller:machine-approver; range_end:; response_count:1; response_revision:10915; }","duration":"264.706949ms","start":"2026-03-19T11:57:50.994875Z","end":"2026-03-19T11:57:51.259582Z","steps":["trace[1438990454] 'agreement among raft nodes before linearized reading' (duration: 264.546064ms)"],"step_count":1} 2026-03-19T11:57:51.259770372Z {"level":"warn","ts":"2026-03-19T11:57:51.259623Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"200.085338ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace\" ","response":"range_response_count:1 size:1024"} 2026-03-19T11:57:51.259857885Z {"level":"info","ts":"2026-03-19T11:57:51.259775Z","caller":"traceutil/trace.go:171","msg":"trace[33967062] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace; range_end:; response_count:1; response_revision:10915; }","duration":"200.272513ms","start":"2026-03-19T11:57:51.059490Z","end":"2026-03-19T11:57:51.259763Z","steps":["trace[33967062] 'agreement among raft nodes before linearized reading' (duration: 200.109729ms)"],"step_count":1} 2026-03-19T11:57:51.259874255Z {"level":"info","ts":"2026-03-19T11:57:51.259587Z","caller":"traceutil/trace.go:171","msg":"trace[1590086363] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-controller-manager-operator/openshift-controller-manager-operator; range_end:; response_count:1; response_revision:10915; }","duration":"189.446652ms","start":"2026-03-19T11:57:51.070115Z","end":"2026-03-19T11:57:51.259561Z","steps":["trace[1590086363] 'agreement among raft nodes before linearized reading' (duration: 189.426632ms)"],"step_count":1} 2026-03-19T11:57:51.259963028Z {"level":"warn","ts":"2026-03-19T11:57:51.259664Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"214.440362ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-dns-operator/dns-operator\" ","response":"range_response_count:1 size:1004"} 2026-03-19T11:57:51.259963028Z {"level":"info","ts":"2026-03-19T11:57:51.259920Z","caller":"traceutil/trace.go:171","msg":"trace[1513471190] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/cloudcredentials/cluster; range_end:; response_count:1; response_revision:10915; }","duration":"114.411212ms","start":"2026-03-19T11:57:51.145486Z","end":"2026-03-19T11:57:51.259898Z","steps":["trace[1513471190] 'agreement among raft nodes before linearized reading' (duration: 114.284438ms)"],"step_count":1} 2026-03-19T11:57:51.259983789Z {"level":"info","ts":"2026-03-19T11:57:51.259954Z","caller":"traceutil/trace.go:171","msg":"trace[769329914] range","detail":"{range_begin:/kubernetes.io/roles/openshift-dns-operator/dns-operator; range_end:; response_count:1; response_revision:10915; }","duration":"214.752531ms","start":"2026-03-19T11:57:51.045194Z","end":"2026-03-19T11:57:51.259947Z","steps":["trace[769329914] 'agreement among raft nodes before linearized reading' (duration: 214.441482ms)"],"step_count":1} 2026-03-19T11:57:51.260036611Z {"level":"warn","ts":"2026-03-19T11:57:51.260002Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"290.010867ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/featuregates.config.openshift.io\" ","response":"range_response_count:1 size:10135"} 2026-03-19T11:57:51.260036611Z {"level":"info","ts":"2026-03-19T11:57:51.260026Z","caller":"traceutil/trace.go:171","msg":"trace[1013412582] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/featuregates.config.openshift.io; range_end:; response_count:1; response_revision:10915; }","duration":"290.036588ms","start":"2026-03-19T11:57:50.969982Z","end":"2026-03-19T11:57:51.260019Z","steps":["trace[1013412582] 'agreement among raft nodes before linearized reading' (duration: 289.988606ms)"],"step_count":1} 2026-03-19T11:57:51.260104093Z {"level":"warn","ts":"2026-03-19T11:57:51.260073Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"315.460401ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-operators\" ","response":"range_response_count:1 size:1794"} 2026-03-19T11:57:51.260104093Z {"level":"info","ts":"2026-03-19T11:57:51.260094Z","caller":"traceutil/trace.go:171","msg":"trace[274124597] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-operators; range_end:; response_count:1; response_revision:10915; }","duration":"315.508822ms","start":"2026-03-19T11:57:50.944580Z","end":"2026-03-19T11:57:51.260089Z","steps":["trace[274124597] 'agreement among raft nodes before linearized reading' (duration: 315.470221ms)"],"step_count":1} 2026-03-19T11:57:51.260119483Z {"level":"warn","ts":"2026-03-19T11:57:51.260108Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-19T11:57:50.944564Z","time spent":"315.540933ms","remote":"[::1]:45352","response type":"/etcdserverpb.KV/Range","request count":0,"request size":47,"response count":1,"response size":1818,"request content":"key:\"/kubernetes.io/namespaces/openshift-operators\" "} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715156762311023131 0ustar00000000000000002026-03-19T11:54:55.381289673Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-fdc5db968-8zh6r/oauth-apiserver_current.log0000640000000000000000000011576215156762311031327 0ustar00000000000000002026-03-19T11:55:52.953860262Z E0319 11:55:52.949894 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.953860262Z E0319 11:55:52.949924 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.953860262Z E0319 11:55:52.950185 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.959822910Z E0319 11:55:52.959531 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.962608628Z E0319 11:55:52.962393 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.962747842Z E0319 11:55:52.962694 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.962992340Z E0319 11:55:52.962957 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:55:52.963080673Z E0319 11:55:52.962247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:01.506443725Z W0319 11:56:01.506369 1 logging.go:55] [core] [Channel #1 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:01.834499264Z W0319 11:56:01.834418 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:02.500352498Z W0319 11:56:02.498517 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:02.673046451Z W0319 11:56:02.672950 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:03.351213125Z W0319 11:56:03.351109 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:03.905134015Z W0319 11:56:03.905052 1 logging.go:55] [core] [Channel #17 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:04.861213674Z W0319 11:56:04.861146 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:07.301570918Z W0319 11:56:07.301490 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:07.426673198Z W0319 11:56:07.426582 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:13.891739135Z W0319 11:56:13.891650 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:15.198847958Z E0319 11:56:15.198013 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:15.198847958Z E0319 11:56:15.198085 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:15.198847958Z E0319 11:56:15.198085 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:15.198847958Z E0319 11:56:15.198087 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:15.198847958Z E0319 11:56:15.198087 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:15.355764073Z E0319 11:56:15.355694 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:15.355833826Z E0319 11:56:15.355756 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:15.355926628Z E0319 11:56:15.355855 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:15.355926628Z E0319 11:56:15.355894 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:15.356004011Z E0319 11:56:15.355968 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.932745950Z W0319 11:56:22.932635 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:22.960859047Z E0319 11:56:22.960768 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.960859047Z E0319 11:56:22.960820 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.960917149Z E0319 11:56:22.960888 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.961171697Z E0319 11:56:22.961094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.969753937Z E0319 11:56:22.968404 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.969753937Z E0319 11:56:22.968684 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.969753937Z E0319 11:56:22.968766 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.969753937Z E0319 11:56:22.969003 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.969753937Z E0319 11:56:22.969203 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.969753937Z E0319 11:56:22.969216 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.969753937Z E0319 11:56:22.969470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.970710748Z E0319 11:56:22.970677 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.977525384Z E0319 11:56:22.977470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:22.994039105Z E0319 11:56:22.990485 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:23.010411642Z E0319 11:56:23.010354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:23.020856571Z E0319 11:56:23.020771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:23.933945043Z W0319 11:56:23.933843 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-19T11:56:45.202179302Z E0319 11:56:45.202115 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:45.202281065Z E0319 11:56:45.202235 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:45.202292515Z E0319 11:56:45.202115 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:45.202396189Z E0319 11:56:45.202378 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:45.202576084Z E0319 11:56:45.202511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:45.369877867Z E0319 11:56:45.367282 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:45.369877867Z E0319 11:56:45.367361 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:45.369877867Z E0319 11:56:45.367282 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:45.369877867Z E0319 11:56:45.367571 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:45.369877867Z E0319 11:56:45.367777 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.965786563Z E0319 11:56:52.965694 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.966030541Z E0319 11:56:52.965989 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.966172606Z E0319 11:56:52.966113 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.966172606Z E0319 11:56:52.966139 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.966181576Z E0319 11:56:52.966166 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.966348021Z E0319 11:56:52.966318 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.966493696Z E0319 11:56:52.966467 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.966531927Z E0319 11:56:52.966503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.966606559Z E0319 11:56:52.966580 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:56:52.966685202Z E0319 11:56:52.966508 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.211090722Z E0319 11:57:15.210992 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.211273118Z E0319 11:57:15.211220 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.219888070Z E0319 11:57:15.217578 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.219888070Z E0319 11:57:15.217747 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.219888070Z E0319 11:57:15.217582 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.375403650Z E0319 11:57:15.375315 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.375914576Z E0319 11:57:15.375836 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.376226366Z E0319 11:57:15.376145 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.376423513Z E0319 11:57:15.376380 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:15.377250559Z E0319 11:57:15.377200 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.959412270Z E0319 11:57:22.959346 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.965838333Z E0319 11:57:22.965636 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.968182457Z E0319 11:57:22.968155 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.974208677Z E0319 11:57:22.974167 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.974241708Z E0319 11:57:22.974216 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.974306951Z E0319 11:57:22.974287 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.974398903Z E0319 11:57:22.974368 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.974466556Z E0319 11:57:22.974432 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.974478836Z E0319 11:57:22.974470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.974533138Z E0319 11:57:22.974507 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.977852833Z E0319 11:57:22.977542 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.994326123Z E0319 11:57:22.994273 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:22.999053012Z E0319 11:57:22.999001 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:23.971155877Z E0319 11:57:23.971094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.225451435Z E0319 11:57:45.225375 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.225451435Z E0319 11:57:45.225409 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.225451435Z E0319 11:57:45.225420 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.225750174Z E0319 11:57:45.225679 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.225750174Z E0319 11:57:45.225715 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.380218202Z E0319 11:57:45.380152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.380218202Z E0319 11:57:45.380176 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.380916453Z E0319 11:57:45.380484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.380916453Z E0319 11:57:45.380598 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" 2026-03-19T11:57:45.385415476Z E0319 11:57:45.384987 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=5708661825655300070, SKID=E5:D2:15:89:33:82:61:06:74:BE:AC:90:8E:2F:D4:D7:03:BF:13:40, AKID=3E:C0:14:94:66:36:E5:1A:8B:67:C8:51:2B:76:7F:CA:C9:B9:AC:AB failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/logs/router-default-7dcf5569b5-lkpgl/router_current.log0000640000000000000000000001067715156762311027163 0ustar00000000000000002026-03-19T11:57:43.041224156Z I0319 11:57:43.041013 1 template.go:560] "msg"="starting router" "logger"="router" "version"="majorFromGit: \nminorFromGit: \ncommitFromGit: ccd9551702a89cac27e38ebb63801ddb6823d101\nversionFromGit: 4.0.0-565-gccd95517\ngitTreeState: clean\nbuildDate: 2026-02-25T01:31:30Z\n" 2026-03-19T11:57:43.046910675Z I0319 11:57:43.046848 1 metrics.go:156] "msg"="router health and metrics port listening on HTTP and HTTPS" "address"="0.0.0.0:1936" "logger"="metrics" 2026-03-19T11:57:43.051089718Z I0319 11:57:43.051050 1 router.go:217] "msg"="creating a new template router" "logger"="template" "writeDir"="/var/lib/haproxy" 2026-03-19T11:57:43.051176151Z I0319 11:57:43.051135 1 router.go:302] "msg"="router will coalesce reloads within an interval of each other" "interval"="5s" "logger"="template" 2026-03-19T11:57:43.051609093Z I0319 11:57:43.051584 1 router.go:372] "msg"="watching for changes" "logger"="template" "path"="/etc/pki/tls/private" 2026-03-19T11:57:43.051682416Z I0319 11:57:43.051660 1 router.go:283] "msg"="router is including routes in all namespaces" "logger"="router" 2026-03-19T11:57:43.056054504Z W0319 11:57:43.056007 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-19T11:57:43.056078255Z E0319 11:57:43.056055 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-19T11:57:43.068608620Z I0319 11:57:43.066249 1 reflector.go:359] Caches populated for *v1.EndpointSlice from github.com/openshift/router/pkg/router/controller/factory/factory.go:124 2026-03-19T11:57:43.068608620Z I0319 11:57:43.066604 1 reflector.go:359] Caches populated for *v1.Service from github.com/openshift/router/pkg/router/template/service_lookup.go:33 2026-03-19T11:57:44.543700307Z W0319 11:57:44.543596 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-19T11:57:44.543700307Z E0319 11:57:44.543666 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-19T11:57:44.659832085Z I0319 11:57:44.659342 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-19T11:57:44.659832085Z [-]backend-http failed: backend reported failure 2026-03-19T11:57:44.659832085Z [-]has-synced failed: Router not synced 2026-03-19T11:57:45.664977123Z I0319 11:57:45.664905 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-19T11:57:45.664977123Z [-]backend-http failed: backend reported failure 2026-03-19T11:57:45.664977123Z [-]has-synced failed: Router not synced 2026-03-19T11:57:46.367438574Z W0319 11:57:46.367343 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-19T11:57:46.367438574Z E0319 11:57:46.367402 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-19T11:57:46.659266149Z I0319 11:57:46.659186 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-19T11:57:46.659266149Z [-]backend-http failed: backend reported failure 2026-03-19T11:57:46.659266149Z [-]has-synced failed: Router not synced 2026-03-19T11:57:47.660207704Z I0319 11:57:47.660120 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-19T11:57:47.660207704Z [-]backend-http failed: backend reported failure 2026-03-19T11:57:47.660207704Z [-]has-synced failed: Router not synced 2026-03-19T11:57:48.662478321Z I0319 11:57:48.661750 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-19T11:57:48.662478321Z [-]backend-http failed: backend reported failure 2026-03-19T11:57:48.662478321Z [-]has-synced failed: Router not synced authentication-operator_current.log0000640000000000000000000003062515156762311037555 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-pkgvq2026-03-19T11:56:48.508071038Z Copying system trust bundle 2026-03-19T11:56:48.666017915Z W0319 11:56:48.663619 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-19T11:56:48.678537600Z I0319 11:56:48.673655 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-19T11:56:48.678537600Z I0319 11:56:48.673713 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-19T11:56:48.678537600Z I0319 11:56:48.675301 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:48.691028195Z I0319 11:56:48.690908 1 observer_polling.go:159] Starting file observer 2026-03-19T11:56:48.778928260Z I0319 11:56:48.778850 1 builder.go:304] cluster-authentication-operator version - 2026-03-19T11:56:48.779972043Z I0319 11:56:48.779948 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:56:59.796998513Z I0319 11:56:59.796468 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-19T11:56:59.819493544Z I0319 11:56:59.819403 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-19T11:56:59.819493544Z I0319 11:56:59.819433 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-19T11:56:59.819493544Z I0319 11:56:59.819458 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-19T11:56:59.819493544Z I0319 11:56:59.819471 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-19T11:56:59.829662404Z I0319 11:56:59.829609 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-19T11:56:59.829723846Z W0319 11:56:59.829713 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.829750687Z W0319 11:56:59.829739 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-19T11:56:59.829830720Z W0319 11:56:59.829814 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-19T11:56:59.829884591Z W0319 11:56:59.829873 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-19T11:56:59.829908492Z W0319 11:56:59.829900 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-19T11:56:59.829929303Z W0319 11:56:59.829921 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-19T11:56:59.830487981Z I0319 11:56:59.830473 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-19T11:56:59.841566421Z I0319 11:56:59.835768 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-19T11:56:59.841566421Z I0319 11:56:59.835826 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-19T11:56:59.841566421Z I0319 11:56:59.835871 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:56:59.841566421Z I0319 11:56:59.835879 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:59.841566421Z I0319 11:56:59.835894 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:56:59.841566421Z I0319 11:56:59.835898 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.841566421Z I0319 11:56:59.836069 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-19T11:56:59.841566421Z I0319 11:56:59.836075 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-19T11:56:59.841566421Z I0319 11:56:59.836141 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773921240\" (2026-03-19 11:54:03 +0000 UTC to 2028-03-18 11:54:04 +0000 UTC (now=2026-03-19 11:56:59.836093178 +0000 UTC))" 2026-03-19T11:56:59.841566421Z I0319 11:56:59.836257 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921409\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921409\" (2026-03-19 10:56:48 +0000 UTC to 2027-03-19 10:56:48 +0000 UTC (now=2026-03-19 11:56:59.836234862 +0000 UTC))" 2026-03-19T11:56:59.841566421Z I0319 11:56:59.836274 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-19T11:56:59.841566421Z I0319 11:56:59.836304 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-19T11:56:59.841566421Z I0319 11:56:59.836326 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-19T11:56:59.841566421Z I0319 11:56:59.836460 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-19T11:56:59.847883170Z I0319 11:56:59.847814 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-19T11:56:59.847976503Z I0319 11:56:59.847937 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-19T11:56:59.848524690Z I0319 11:56:59.848490 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-19T11:56:59.849366807Z I0319 11:56:59.849321 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-19T11:56:59.850358968Z I0319 11:56:59.849871 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-03-19T11:56:59.936144347Z I0319 11:56:59.936029 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-19T11:56:59.936230429Z I0319 11:56:59.936151 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-19T11:56:59.936354533Z I0319 11:56:59.936309 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-19T11:56:59.936468947Z I0319 11:56:59.936436 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-19 11:43:19 +0000 UTC to 2026-03-20 11:43:19 +0000 UTC (now=2026-03-19 11:56:59.936397215 +0000 UTC))" 2026-03-19T11:56:59.936649353Z I0319 11:56:59.936620 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773921240\" (2026-03-19 11:54:03 +0000 UTC to 2028-03-18 11:54:04 +0000 UTC (now=2026-03-19 11:56:59.936599821 +0000 UTC))" 2026-03-19T11:56:59.936917441Z I0319 11:56:59.936879 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921409\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921409\" (2026-03-19 10:56:48 +0000 UTC to 2027-03-19 10:56:48 +0000 UTC (now=2026-03-19 11:56:59.93686082 +0000 UTC))" 2026-03-19T11:56:59.937051146Z I0319 11:56:59.937020 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:36:28 +0000 UTC to 2036-03-16 11:36:28 +0000 UTC (now=2026-03-19 11:56:59.937005074 +0000 UTC))" 2026-03-19T11:56:59.937051146Z I0319 11:56:59.937045 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:21 +0000 UTC to 2026-03-20 11:43:21 +0000 UTC (now=2026-03-19 11:56:59.937034915 +0000 UTC))" 2026-03-19T11:56:59.937088197Z I0319 11:56:59.937067 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-19 11:43:21 +0000 UTC to 2027-03-19 11:43:21 +0000 UTC (now=2026-03-19 11:56:59.937051116 +0000 UTC))" 2026-03-19T11:56:59.937115028Z I0319 11:56:59.937089 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-19 11:43:21 +0000 UTC to 2027-03-19 11:43:21 +0000 UTC (now=2026-03-19 11:56:59.937079466 +0000 UTC))" 2026-03-19T11:56:59.937177640Z I0319 11:56:59.937153 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-19 11:43:19 +0000 UTC to 2036-03-16 11:43:19 +0000 UTC (now=2026-03-19 11:56:59.937095367 +0000 UTC))" 2026-03-19T11:56:59.937321004Z I0319 11:56:59.937289 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-19 11:43:19 +0000 UTC to 2026-03-20 11:43:19 +0000 UTC (now=2026-03-19 11:56:59.937276003 +0000 UTC))" 2026-03-19T11:56:59.937466299Z I0319 11:56:59.937435 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773921240\" (2026-03-19 11:54:03 +0000 UTC to 2028-03-18 11:54:04 +0000 UTC (now=2026-03-19 11:56:59.937420587 +0000 UTC))" 2026-03-19T11:56:59.937583633Z I0319 11:56:59.937561 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773921409\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773921409\" (2026-03-19 10:56:48 +0000 UTC to 2027-03-19 10:56:48 +0000 UTC (now=2026-03-19 11:56:59.937546621 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000005203515156762311037746 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-pkgvq2026-03-19T11:55:09.117612397Z I0319 11:55:09.117586 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-19T11:55:09.117657029Z I0319 11:55:09.117646 1 base_controller.go:181] Shutting down WebhookAuthenticatorCertApprover_OpenShiftAuthenticator ... 2026-03-19T11:55:09.117688940Z I0319 11:55:09.117669 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-19T11:55:09.117688940Z I0319 11:55:09.117681 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-19T11:55:09.117697500Z I0319 11:55:09.117691 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ... 2026-03-19T11:55:09.117705060Z I0319 11:55:09.117697 1 base_controller.go:113] All NamespaceFinalizerController_openshift-oauth-apiserver workers have been terminated 2026-03-19T11:55:09.117731531Z I0319 11:55:09.117714 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-19T11:55:09.117758162Z I0319 11:55:09.117748 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ... 2026-03-19T11:55:09.117782143Z I0319 11:55:09.117774 1 base_controller.go:113] All WebhookAuthenticatorCertApprover_OpenShiftAuthenticator workers have been terminated 2026-03-19T11:55:09.117842715Z I0319 11:55:09.117829 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-19T11:55:09.117902567Z I0319 11:55:09.117893 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-19T11:55:09.117926567Z I0319 11:55:09.117918 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-19T11:55:09.117967159Z I0319 11:55:09.117955 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-19T11:55:09.118067662Z I0319 11:55:09.118043 1 genericapiserver.go:640] [graceful-termination] in-flight non long-running request(s) have drained 2026-03-19T11:55:09.118080282Z I0319 11:55:09.118068 1 genericapiserver.go:681] "[graceful-termination] shutdown event" name="InFlightRequestsDrained" 2026-03-19T11:55:09.118106183Z I0319 11:55:09.118089 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-19T11:55:09.118133544Z I0319 11:55:09.118112 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressState controller ... 2026-03-19T11:55:09.118133544Z I0319 11:55:09.118129 1 base_controller.go:113] All openshift-authentication-IngressState workers have been terminated 2026-03-19T11:55:09.118163875Z I0319 11:55:09.118150 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-19T11:55:09.118208156Z I0319 11:55:09.118194 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-19T11:55:09.118234057Z I0319 11:55:09.118200 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-19T11:55:09.118309210Z E0319 11:55:09.118285 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.oauth.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:09.118338000Z I0319 11:55:09.118320 1 base_controller.go:181] Shutting down TrustDistributionController ... 2026-03-19T11:55:09.118350681Z I0319 11:55:09.118339 1 base_controller.go:181] Shutting down RouterCertsDomainValidationController ... 2026-03-19T11:55:09.118395872Z I0319 11:55:09.118381 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-19T11:55:09.118428043Z I0319 11:55:09.118417 1 builder.go:335] server exited 2026-03-19T11:55:09.118500416Z I0319 11:55:09.118485 1 base_controller.go:181] Shutting down openshift-authentication-IngressNodesAvailable ... 2026-03-19T11:55:09.118541267Z I0319 11:55:09.118529 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-19T11:55:09.118588628Z I0319 11:55:09.118577 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionState ... 2026-03-19T11:55:09.118625600Z I0319 11:55:09.118615 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressNodesAvailable controller ... 2026-03-19T11:55:09.118653831Z I0319 11:55:09.118644 1 base_controller.go:113] All openshift-authentication-IngressNodesAvailable workers have been terminated 2026-03-19T11:55:09.118679241Z I0319 11:55:09.118671 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:55:09.118701932Z I0319 11:55:09.118694 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:55:09.118725593Z I0319 11:55:09.118717 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionState controller ... 2026-03-19T11:55:09.118748394Z I0319 11:55:09.118740 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionState workers have been terminated 2026-03-19T11:55:09.118914589Z I0319 11:55:09.118902 1 base_controller.go:123] Shutting down worker of TrustDistributionController controller ... 2026-03-19T11:55:09.118944420Z I0319 11:55:09.118936 1 base_controller.go:113] All TrustDistributionController workers have been terminated 2026-03-19T11:55:09.119132916Z I0319 11:55:09.119061 1 base_controller.go:181] Shutting down openshift-authentication-RemoveStaleConditions ... 2026-03-19T11:55:09.119166147Z I0319 11:55:09.119157 1 base_controller.go:123] Shutting down worker of openshift-authentication-RemoveStaleConditions controller ... 2026-03-19T11:55:09.119187657Z I0319 11:55:09.119179 1 base_controller.go:113] All openshift-authentication-RemoveStaleConditions workers have been terminated 2026-03-19T11:55:09.119213068Z I0319 11:55:09.119205 1 base_controller.go:123] Shutting down worker of StatusSyncer_authentication controller ... 2026-03-19T11:55:09.119243699Z I0319 11:55:09.119235 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-19T11:55:09.119279480Z I0319 11:55:09.119266 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-19T11:55:09.119317442Z I0319 11:55:09.119309 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-19T11:55:09.119342292Z I0319 11:55:09.119334 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-19T11:55:09.119368063Z I0319 11:55:09.119360 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointsEndpointAccessibleController controller ... 2026-03-19T11:55:09.119392284Z I0319 11:55:09.119384 1 base_controller.go:113] All OAuthServerServiceEndpointsEndpointAccessibleController workers have been terminated 2026-03-19T11:55:09.119417455Z I0319 11:55:09.119409 1 base_controller.go:123] Shutting down worker of oauth-server controller ... 2026-03-19T11:55:09.119445886Z I0319 11:55:09.119438 1 base_controller.go:113] All oauth-server workers have been terminated 2026-03-19T11:55:09.119582790Z E0319 11:55:09.119560 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:09.119609061Z I0319 11:55:09.119594 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3367635268/tls.crt::/tmp/serving-cert-3367635268/tls.key" 2026-03-19T11:55:09.119666503Z I0319 11:55:09.119639 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointAccessibleController controller ... 2026-03-19T11:55:09.119666503Z I0319 11:55:09.119652 1 base_controller.go:113] All OAuthServerServiceEndpointAccessibleController workers have been terminated 2026-03-19T11:55:09.119788115Z I0319 11:55:09.119742 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionMigration ... 2026-03-19T11:55:09.119788115Z W0319 11:55:09.119755 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-19T11:55:09.119788115Z I0319 11:55:09.119771 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionCondition ... 2026-03-19T11:55:09.119788115Z E0319 11:55:09.119777 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": context canceled" 2026-03-19T11:55:09.119856948Z I0319 11:55:09.119785 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionKey ... 2026-03-19T11:55:09.119856948Z I0319 11:55:09.119786 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionMigration controller ... 2026-03-19T11:55:09.119868558Z I0319 11:55:09.119854 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-19T11:55:09.119876148Z I0319 11:55:09.119867 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionMigration workers have been terminated 2026-03-19T11:55:09.119883548Z I0319 11:55:09.119870 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-19T11:55:09.119890789Z I0319 11:55:09.119838 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionPrune controller ... 2026-03-19T11:55:09.119898069Z I0319 11:55:09.119850 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-19T11:55:09.119909639Z I0319 11:55:09.119898 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-19T11:55:09.119918800Z I0319 11:55:09.119912 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionCondition controller ... 2026-03-19T11:55:09.119927700Z I0319 11:55:09.119920 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionCondition workers have been terminated 2026-03-19T11:55:09.119934980Z I0319 11:55:09.119827 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionPrune ... 2026-03-19T11:55:09.119942460Z I0319 11:55:09.119932 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionPrune workers have been terminated 2026-03-19T11:55:09.119942460Z I0319 11:55:09.119931 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionKey controller ... 2026-03-19T11:55:09.119951561Z I0319 11:55:09.119945 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionKey workers have been terminated 2026-03-19T11:55:09.119960711Z W0319 11:55:09.119951 1 base_controller.go:242] Updating status of "WebhookAuthenticatorController" failed: unable to ApplyStatus for operator using fieldManager "WebhookAuthenticatorController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-19T11:55:09.119991122Z I0319 11:55:09.119972 1 base_controller.go:181] Shutting down StatusSyncer_authentication ... 2026-03-19T11:55:09.119991122Z I0319 11:55:09.119983 1 base_controller.go:159] All StatusSyncer_authentication post start hooks have been terminated 2026-03-19T11:55:09.119991122Z I0319 11:55:09.119988 1 base_controller.go:113] All StatusSyncer_authentication workers have been terminated 2026-03-19T11:55:09.119999652Z E0319 11:55:09.119987 1 base_controller.go:279] "Unhandled Error" err="WebhookAuthenticatorController reconciliation failed: Get \"https://172.30.0.1:443/apis/config.openshift.io/v1/authentications/cluster\": context canceled" 2026-03-19T11:55:09.120454177Z E0319 11:55:09.120421 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:09.122666446Z I0319 11:55:09.122629 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-19T11:55:09.122666446Z I0319 11:55:09.122656 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-19T11:55:09.122684866Z I0319 11:55:09.122668 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorController controller ... 2026-03-19T11:55:09.122694117Z I0319 11:55:09.122684 1 base_controller.go:123] Shutting down worker of RouterCertsDomainValidationController controller ... 2026-03-19T11:55:09.122701787Z I0319 11:55:09.122692 1 base_controller.go:113] All WebhookAuthenticatorController workers have been terminated 2026-03-19T11:55:09.122701787Z I0319 11:55:09.122696 1 base_controller.go:113] All RouterCertsDomainValidationController workers have been terminated 2026-03-19T11:55:09.122709587Z I0319 11:55:09.122694 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-19T11:55:09.122731728Z I0319 11:55:09.122714 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-19T11:55:09.123272245Z E0319 11:55:09.123185 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:09.124402331Z I0319 11:55:09.124373 1 base_controller.go:123] Shutting down worker of OAuthAPIServerController-WorkloadWorkloadController controller ... 2026-03-19T11:55:09.124402331Z I0319 11:55:09.124392 1 base_controller.go:113] All OAuthAPIServerController-WorkloadWorkloadController workers have been terminated 2026-03-19T11:55:09.129630334Z W0319 11:55:09.129578 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal 2026-03-19T11:55:09.129630334Z W0319 11:55:09.129609 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal 2026-03-19T11:55:09.129820640Z E0319 11:55:09.129774 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": client rate limiter Wait returned an error: context canceled" 2026-03-19T11:55:09.131078109Z I0319 11:55:09.131046 1 base_controller.go:123] Shutting down worker of openshift-authentication-ServiceCA controller ... 2026-03-19T11:55:09.131078109Z I0319 11:55:09.131067 1 base_controller.go:113] All openshift-authentication-ServiceCA workers have been terminated 2026-03-19T11:55:09.176463451Z E0319 11:55:09.176365 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-authentication\": context canceled, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/serviceaccount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/oauth-service.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-19T11:55:09.177945418Z I0319 11:55:09.177883 1 base_controller.go:123] Shutting down worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2026-03-19T11:55:09.177945418Z I0319 11:55:09.177927 1 base_controller.go:113] All OpenshiftAuthenticationStaticResources-StaticResources workers have been terminated 2026-03-19T11:55:14.111172697Z I0319 11:55:14.111048 1 observer_polling.go:162] Shutting down file observer 2026-03-19T11:55:29.791114384Z E0319 11:55:29.791047 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{authentication-operator.189e3c03209b8a56 openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-03-19 11:54:47.360186966 +0000 UTC m=+58.820461829,LastTimestamp:2026-03-19 11:54:47.360186966 +0000 UTC m=+58.820461829,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}" 2026-03-19T11:55:43.120867700Z E0319 11:55:43.120742 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-19T11:55:43.120867700Z W0319 11:55:43.120842 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-pkgvq.json0000640000000000000000000001610315156762311030441 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5885bfd7f4-pkgvq","generateName":"authentication-operator-5885bfd7f4-","namespace":"openshift-authentication-operator","uid":"d3017b5e-178e-49de-89d2-817a18398203","resourceVersion":"9583","creationTimestamp":"2026-03-19T11:51:44Z","labels":{"app":"authentication-operator","pod-template-hash":"5885bfd7f4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5885bfd7f4","uid":"d161c4f9-f792-4748-ba37-a3e7e7abeed8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-b6wm6","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fdcbf7be3f90bd080ffb2c75b091d7eef03681e0f90912ff6140ee48c177616"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.35_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-b6wm6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:49Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-03-19T11:53:37Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:48Z","finishedAt":"2026-03-19T11:55:43Z","containerID":"cri-o://ec99e0001708bd8c36619c411325f2d4bdab0ecd7770deeae64fffd8bdf90881"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","containerID":"cri-o://6dedac466f0712e9cb88164ac3beff662b4163f5b6d34ec1e978daf51f4b9061","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-b6wm6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003157315156762311020654 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:07Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-7b95f86987 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:19Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5c9796789 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:20Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-68f85b4d6c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:20Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:21Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:48:22Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:41Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:41Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:41Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:43Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:44Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-7b95f86987-6j2nj","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:44Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5c9796789-8cldl","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:46Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-68f85b4d6c-2trz4","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:51:46Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-6j2nj to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-5c9796789-8cldl to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-2trz4 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:53:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:53:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:53:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.5/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.27/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:24Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:25Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:25Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 15.311s (15.311s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 16.002s (16.002s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 16.483s (16.483s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:42Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:42Z","reason":"LeaderElection","message":"package-server-manager-7b95f86987-6j2nj_3a01edb0-bd15-41fa-ae72-b5359ec96ed3 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:43Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:44Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-77d68bd5f8-w9hmb","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:44Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/packageserver-77d68bd5f8-w9hmb to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-77d68bd5f8 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:44Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:44Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:45Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:45Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:45Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-19T11:54:45Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001310115156762311015437 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:09Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-594b8bbb67-8fxxb to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:09Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-594b8bbb67-8fxxb","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-594b8bbb67 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:17Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:17Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-594b8bbb67 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:18Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-594b8bbb67-8fxxb","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-897cc986b to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:18Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-897cc986b-vpg2l","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:19Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-897cc986b-vpg2l to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:23Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" in 16.919s (16.919s including waiting). Image size: 589386806 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:43Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:43Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:43Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:43Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:47Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-19T11:54:47Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000006440015156762311017300 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:48:04Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-d65958b8 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:48:15Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:51:41Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:51:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:51:44Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-d65958b8-mjs7x","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-mjs7x to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\": pull QPS exceeded","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:40Z","reason":"BackOff","message":"Back-off pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:40Z","reason":"Failed","message":"Error: ImagePullBackOff","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" in 5.792s (5.792s including waiting). Image size: 512274055 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"LeaderElection","message":"openshift-apiserver-operator-d65958b8-mjs7x_5d76f044-a929-4bc1-ad65-340ce674f749 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:05Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:09Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:56:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007522015156762311020204 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:48:03Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-dddff6458 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:48:14Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:51:42Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:51:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:51:45Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-dddff6458-ptqdh","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-ptqdh to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" in 9.143s (9.143s including waiting). Image size: 506395599 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-dddff6458-ptqdh_00d1efb9-f2ef-4fba-957d-734ee4727b3e became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\",Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:05Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:09Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:18Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:18Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:21Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:28Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:28Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:28Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:32Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:45Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:45Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:56:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000516015156762311016347 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:08Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:08Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:08Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:08Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:18Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:22Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:23Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:23Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:30Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:40Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.48/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012766315156762311022032 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:48:02Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-ff989d6cc to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:48:12Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:51:43Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:51:45Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-ff989d6cc-fjn4b","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:51:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-fjn4b to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" in 9.335s (9.335s including waiting). Image size: 508888171 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"),Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"LeaderElection","message":"kube-controller-manager-operator-ff989d6cc-fjn4b_d56b422f-279c-4077-b5c4-ca7faf6aab52 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-zv7pd\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-zv7pd\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:19Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:21Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:22Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:22Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:23Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:23Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:24Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:25Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:25Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:28Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:37Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:38Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:39Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:40Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.15:52292-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.15:60089-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.15:52292-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.15:60089-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:46Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:51Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:51Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:54:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:56:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000342615156762311020167 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:40Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:45Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.58/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:47Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-19T11:54:47Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215156762311016367 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:54:40Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000017267115156762311020236 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:48:19Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-8b68b9d9b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:48:22Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:51:42Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:51:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:51:45Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-8b68b9d9b-qv4cg","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-qv4cg to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.14/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:39Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:40Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:40Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:40Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:40Z","reason":"LeaderElection","message":"kube-apiserver-operator-8b68b9d9b-qv4cg_30ffe9c8-6d3e-42f5-b5bf-0fe4f51e8db5 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:40Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:40Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Progressing changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:43Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:43Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:43Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:43Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:43Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:44Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:45Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:45Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:45Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:45Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:45Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:45Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:46Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:47Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:47Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:13Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nResourceSyncControllerDegraded: configmaps \\\"kube-apiserver-client-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nResourceSyncControllerDegraded: configmaps \\\"kube-apiserver-client-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/kube-apiserver-client-ca -n openshift-config-managed: configmaps \"kube-apiserver-client-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:21Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:23Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:24Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:28Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:28Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:30Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:54:33Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:56:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001326215156762311014366 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:21Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:21Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:54Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 1","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:55Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:54:55Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:23Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:23Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:23Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:24Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:24Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:25Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:25Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:26Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:26Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:30Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:30Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:32Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:32Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:33Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:33Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-19T11:55:45Z","reason":"ProbeError","message":"Startup probe error: Get \"https://192.168.32.10:9980/readyz\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"}]}events/openshift-etcd-operator.json0000640000000000000000000004401515156762311016217 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:48:07Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-8544cbcf9c to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:48:17Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:51:42Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:51:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:51:45Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-8544cbcf9c-sc4kz","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-8544cbcf9c-sc4kz to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.18/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" in 9.396s (9.396s including waiting). Image size: 518384969 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"LeaderElection","message":"etcd-operator-8544cbcf9c-sc4kz_a05496df-b22e-485f-91c3-0dedea9e7644 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\\nClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nEtcdEndpointsDegraded: failed to get member list: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"DefragControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:03Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:05Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:54:05Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:56:04Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.18:8443/healthz\": dial tcp 10.128.0.18:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:56:04Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.18:8443/healthz\": dial tcp 10.128.0.18:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:56:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-machine-api.json0000640000000000000000000003267215156762311015630 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:48:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-baremetal-operator-6f69995874 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:48:22Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:51:43Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:51:45Z","reason":"SuccessfulCreate","message":"Created pod: cluster-baremetal-operator-6f69995874-ftml6","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:51:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-api/cluster-baremetal-operator-6f69995874-ftml6 to master-0","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:53:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:53:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:54:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:54:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:54:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.24/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:54:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97\" in 15.669s (15.67s including waiting). Image size: 470826739 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:54:40Z","reason":"LeaderElection","message":"cluster-baremetal-operator-6f69995874-ftml6_a0f80a45-2064-4118-a52e-673fb27ed682 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Created","message":"Created container: baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Started","message":"Started container baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:00Z","reason":"Created","message":"Created container: cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:00Z","reason":"LeaderElection","message":"cluster-baremetal-operator-6f69995874-ftml6_6b7802aa-0185-461e-8c48-43a8c506960e became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:00Z","reason":"Started","message":"Started container cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-autoscaler-operator-866dc4744 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set control-plane-machine-set-operator-6f97756bc8 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:18Z","reason":"SuccessfulCreate","message":"Created pod: cluster-autoscaler-operator-866dc4744-fblgs","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:18Z","reason":"SuccessfulCreate","message":"Created pod: machine-api-operator-6fbb6cf6f9-75w5c","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-api-operator-6fbb6cf6f9 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:18Z","reason":"SuccessfulCreate","message":"Created pod: control-plane-machine-set-operator-6f97756bc8-tql86","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.70/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.71/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.72/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:19Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3\" in 3.365s (3.365s including waiting). Image size: 470681292 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:23Z","reason":"Started","message":"Started container control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:23Z","reason":"LeaderElection","message":"control-plane-machine-set-operator-6f97756bc8-tql86_f44263c5-1ecd-4a43-a903-ad1575af904d became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:23Z","reason":"Created","message":"Created container: control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:38Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db\" in 18.926s (18.926s including waiting). Image size: 456375453 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:39Z","reason":"Created","message":"Created container: cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:39Z","reason":"Started","message":"Started container cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:39Z","reason":"LeaderElection","message":"cluster-autoscaler-operator-866dc4744-fblgs_7b1fb4de-385b-4d48-abb1-2cf38d1e8261 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:39Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c\" in 19.019s (19.019s including waiting). Image size: 862205633 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:39Z","reason":"Created","message":"Created container: machine-api-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:39Z","reason":"Started","message":"Started container machine-api-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-19T11:57:39Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443615156762311016570 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-fdc5db968 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:17Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-fdc5db968-8zh6r to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:17Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-fdc5db968-8zh6r","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:35Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" in 14.696s (14.696s including waiting). Image size: 505345991 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:40Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:42Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-19T11:54:42Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000431115156762311015114 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:54:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:54:42Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7dcf5569b5-lkpgl","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:54:42Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7dcf5569b5 to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:54:47Z","reason":"Scheduled","message":"Successfully assigned openshift-ingress/router-default-7dcf5569b5-lkpgl to master-0","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:54:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:54:54Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777\" in 7.013s (7.013s including waiting). Image size: 487159945 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:54:55Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:54:56Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:55:06Z","reason":"Unhealthy","message":"Startup probe failed: Get \"http://localhost:1936/healthz/ready\": dial tcp [::1]:1936: connect: connection refused","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-19T11:55:07Z","reason":"ProbeError","message":"Startup probe error: Get \"http://localhost:1936/healthz/ready\": dial tcp [::1]:1936: connect: connection refused\nbody: \n","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000020531015156762311020314 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:48:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5885bfd7f4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:48:16Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:51:42Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:51:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:51:44Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5885bfd7f4-pkgvq","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:37Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-5885bfd7f4-pkgvq to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.12/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" in 9.33s (9.33s including waiting). Image size: 513221333 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:48Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:49Z","reason":"LeaderElection","message":"authentication-operator-5885bfd7f4-pkgvq_74a5b97c-cdb1-4a9f-96dd-a16f94e77654 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"\" to \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-q5cs2\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-q5cs2\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:54Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:56Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:53:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:00Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:01Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:07Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:12Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:16Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:17Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Failed to get system serving cert secret \\\"v4-0-config-system-serving-cert\\\": secret \\\"v4-0-config-system-serving-cert\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:44Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:44Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:44Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:44Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"oauth-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:45Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:46Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:46Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:46Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.209.16:443/healthz\\\": dial tcp 172.30.209.16:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:54:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:55:34Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:55:34Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.12:8443/healthz\": dial tcp 10.128.0.12:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:56:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-19T11:56:48Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015156762311016277 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-19T11:54:43Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-19T11:54:43Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003543715156762300014621 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":345,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1},{"name":"telemeter-client","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015156762300014100 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000004345615156762265014564 0ustar0000000000000000Mar 19 11:56:31.862640 master-0 kubenswrapper[7454]: I0319 11:56:31.862573 7454 patch_prober.go:28] interesting pod/openshift-config-operator-95bf4f4d-nhvl4 container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" start-of-body= Mar 19 11:56:31.862910 master-0 kubenswrapper[7454]: I0319 11:56:31.862642 7454 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-nhvl4" podUID="aef8e03f-0363-4e13-b7ca-4fa871d77c62" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" Mar 19 11:56:33.055533 master-0 kubenswrapper[7454]: E0319 11:56:33.055467 7454 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 19 11:56:34.686219 master-0 kubenswrapper[7454]: E0319 11:56:34.686149 7454 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Mar 19 11:56:34.686452 master-0 kubenswrapper[7454]: E0319 11:56:34.686365 7454 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.023s" Mar 19 11:56:34.862408 master-0 kubenswrapper[7454]: I0319 11:56:34.862339 7454 patch_prober.go:28] interesting pod/openshift-config-operator-95bf4f4d-nhvl4 container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" start-of-body= Mar 19 11:56:34.862636 master-0 kubenswrapper[7454]: I0319 11:56:34.862424 7454 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-nhvl4" podUID="aef8e03f-0363-4e13-b7ca-4fa871d77c62" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" Mar 19 11:56:36.150746 master-0 kubenswrapper[7454]: E0319 11:56:36.150604 7454 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Mar 19 11:56:37.119484 master-0 kubenswrapper[7454]: E0319 11:56:37.119281 7454 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-master-0.189e3c04fe42a144 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:etcd-master-0,UID:24b4ed170d527099878cb5fdd508a2fb,APIVersion:v1,ResourceVersion:,FieldPath:spec.initContainers{setup},},Reason:Created,Message:Created container: setup,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-03-19 11:54:55.37386938 +0000 UTC m=+65.004335293,LastTimestamp:2026-03-19 11:54:55.37386938 +0000 UTC m=+65.004335293,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Mar 19 11:56:37.862095 master-0 kubenswrapper[7454]: I0319 11:56:37.861993 7454 patch_prober.go:28] interesting pod/openshift-config-operator-95bf4f4d-nhvl4 container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" start-of-body= Mar 19 11:56:37.862095 master-0 kubenswrapper[7454]: I0319 11:56:37.862082 7454 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-nhvl4" podUID="aef8e03f-0363-4e13-b7ca-4fa871d77c62" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" Mar 19 11:56:38.941130 master-0 kubenswrapper[7454]: E0319 11:56:38.941003 7454 projected.go:194] Error preparing data for projected volume kube-api-access-jnp9l for pod openshift-marketplace/redhat-marketplace-cjgpg: failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 19 11:56:38.941130 master-0 kubenswrapper[7454]: E0319 11:56:38.941088 7454 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/0ed7eded-1e67-49ad-9777-c2ed1e006ce3-kube-api-access-jnp9l podName:0ed7eded-1e67-49ad-9777-c2ed1e006ce3 nodeName:}" failed. No retries permitted until 2026-03-19 11:56:40.941065634 +0000 UTC m=+170.571531547 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "kube-api-access-jnp9l" (UniqueName: "kubernetes.io/projected/0ed7eded-1e67-49ad-9777-c2ed1e006ce3-kube-api-access-jnp9l") pod "redhat-marketplace-cjgpg" (UID: "0ed7eded-1e67-49ad-9777-c2ed1e006ce3") : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 19 11:56:40.862244 master-0 kubenswrapper[7454]: I0319 11:56:40.862174 7454 patch_prober.go:28] interesting pod/openshift-config-operator-95bf4f4d-nhvl4 container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" start-of-body= Mar 19 11:56:40.862616 master-0 kubenswrapper[7454]: I0319 11:56:40.862252 7454 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-nhvl4" podUID="aef8e03f-0363-4e13-b7ca-4fa871d77c62" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" Mar 19 11:56:43.056535 master-0 kubenswrapper[7454]: E0319 11:56:43.056440 7454 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 19 11:56:43.863098 master-0 kubenswrapper[7454]: I0319 11:56:43.862994 7454 patch_prober.go:28] interesting pod/openshift-config-operator-95bf4f4d-nhvl4 container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" start-of-body= Mar 19 11:56:43.863098 master-0 kubenswrapper[7454]: I0319 11:56:43.863086 7454 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-nhvl4" podUID="aef8e03f-0363-4e13-b7ca-4fa871d77c62" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" Mar 19 11:56:46.862077 master-0 kubenswrapper[7454]: I0319 11:56:46.861966 7454 patch_prober.go:28] interesting pod/openshift-config-operator-95bf4f4d-nhvl4 container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" start-of-body= Mar 19 11:56:46.862077 master-0 kubenswrapper[7454]: I0319 11:56:46.862070 7454 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-nhvl4" podUID="aef8e03f-0363-4e13-b7ca-4fa871d77c62" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused" Mar 19 11:56:47.620064 master-0 kubenswrapper[7454]: E0319 11:56:47.619463 7454 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="12.933s" Mar 19 11:56:47.754029 master-0 kubenswrapper[7454]: E0319 11:56:47.753966 7454 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="3.2s" Mar 19 11:56:49.093864 master-0 kubenswrapper[7454]: E0319 11:56:49.093572 7454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"119bf6827db5b99fa9f0be9581be040a80edb534abd0a1348f3d58833768911f\": container with ID starting with 119bf6827db5b99fa9f0be9581be040a80edb534abd0a1348f3d58833768911f not found: ID does not exist" containerID="119bf6827db5b99fa9f0be9581be040a80edb534abd0a1348f3d58833768911f" Mar 19 11:56:49.094927 master-0 kubenswrapper[7454]: E0319 11:56:49.094707 7454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"a73ef6ab87ac7f56538653c5c86cb08ccd6e50dfb5fbf1edd61c934ee0c0aadc\": container with ID starting with a73ef6ab87ac7f56538653c5c86cb08ccd6e50dfb5fbf1edd61c934ee0c0aadc not found: ID does not exist" containerID="a73ef6ab87ac7f56538653c5c86cb08ccd6e50dfb5fbf1edd61c934ee0c0aadc" Mar 19 11:56:49.099341 master-0 kubenswrapper[7454]: E0319 11:56:49.097452 7454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"a96fd225dafcf97e7d05dad471494b2e0d85fd2d1d63677ffa5677e1fef31cd9\": container with ID starting with a96fd225dafcf97e7d05dad471494b2e0d85fd2d1d63677ffa5677e1fef31cd9 not found: ID does not exist" containerID="a96fd225dafcf97e7d05dad471494b2e0d85fd2d1d63677ffa5677e1fef31cd9" Mar 19 11:56:49.101644 master-0 kubenswrapper[7454]: I0319 11:56:49.100997 7454 patch_prober.go:28] interesting pod/marketplace-operator-89ccd998f-pr7gk container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.21:8080/healthz\": dial tcp 10.128.0.21:8080: connect: connection refused" start-of-body= Mar 19 11:56:49.101644 master-0 kubenswrapper[7454]: I0319 11:56:49.101024 7454 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-89ccd998f-pr7gk" podUID="b0f5939c-48b1-4d6c-9712-9128a78d603b" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.21:8080/healthz\": dial tcp 10.128.0.21:8080: connect: connection refused" Mar 19 11:56:49.264020 master-0 kubenswrapper[7454]: E0319 11:56:49.263976 7454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"01c6345f7bbfbca980ae704e3ee9f222c4d7648651263304ba6c17e7dd5b469b\": container with ID starting with 01c6345f7bbfbca980ae704e3ee9f222c4d7648651263304ba6c17e7dd5b469b not found: ID does not exist" containerID="01c6345f7bbfbca980ae704e3ee9f222c4d7648651263304ba6c17e7dd5b469b" Mar 19 11:56:49.268019 master-0 kubenswrapper[7454]: E0319 11:56:49.267961 7454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"8caa550d637bf8158cfa690d480d13253effda2df95bdebb7484c3a287ec13ac\": container with ID starting with 8caa550d637bf8158cfa690d480d13253effda2df95bdebb7484c3a287ec13ac not found: ID does not exist" containerID="8caa550d637bf8158cfa690d480d13253effda2df95bdebb7484c3a287ec13ac" Mar 19 11:56:49.268472 master-0 kubenswrapper[7454]: E0319 11:56:49.268447 7454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f0e553719f0fc9ee108ddf64a7ed8d6042b89d616fa26b1f17b8415d992c87a2\": container with ID starting with f0e553719f0fc9ee108ddf64a7ed8d6042b89d616fa26b1f17b8415d992c87a2 not found: ID does not exist" containerID="f0e553719f0fc9ee108ddf64a7ed8d6042b89d616fa26b1f17b8415d992c87a2" Mar 19 11:56:54.261505 master-0 kubenswrapper[7454]: E0319 11:56:54.261474 7454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"openshift-controller-manager-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=openshift-controller-manager-operator pod=openshift-controller-manager-operator-8c94f4649-gx4w8_openshift-controller-manager-operator(9ed2dbd1-aec4-4009-917a-933533912ab5)\"" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-gx4w8" podUID="9ed2dbd1-aec4-4009-917a-933533912ab5" Mar 19 11:56:56.323843 master-0 kubenswrapper[7454]: E0319 11:56:56.323550 7454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"190d503cfa5b3468f9c6f03dd24e2c652db25c8933a5abbed215bb786c5ba261\": container with ID starting with 190d503cfa5b3468f9c6f03dd24e2c652db25c8933a5abbed215bb786c5ba261 not found: ID does not exist" containerID="190d503cfa5b3468f9c6f03dd24e2c652db25c8933a5abbed215bb786c5ba261" Mar 19 11:56:56.324049 master-0 kubenswrapper[7454]: E0319 11:56:56.323927 7454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"4d2f9c965608f2ecf77aeff13b4656c12f2fe4c17a81e488d5e58ef86cf4113b\": container with ID starting with 4d2f9c965608f2ecf77aeff13b4656c12f2fe4c17a81e488d5e58ef86cf4113b not found: ID does not exist" containerID="4d2f9c965608f2ecf77aeff13b4656c12f2fe4c17a81e488d5e58ef86cf4113b" Mar 19 11:56:56.325581 master-0 kubenswrapper[7454]: E0319 11:56:56.325552 7454 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"28ea8e21ba4afb486655483dd5710a876c83a2c01ce9d2707b582b55e7a1e992\": container with ID starting with 28ea8e21ba4afb486655483dd5710a876c83a2c01ce9d2707b582b55e7a1e992 not found: ID does not exist" containerID="28ea8e21ba4afb486655483dd5710a876c83a2c01ce9d2707b582b55e7a1e992" Mar 19 11:57:16.244103 master-0 kubenswrapper[7454]: E0319 11:57:16.243872 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="77497070-ffa8-45e5-935d-5281828d6962" containerName="extract-utilities" Mar 19 11:57:16.244103 master-0 kubenswrapper[7454]: E0319 11:57:16.243925 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="903d114c-199f-46f9-b39b-afa52df71ea9" containerName="registry-server" Mar 19 11:57:16.244103 master-0 kubenswrapper[7454]: E0319 11:57:16.243973 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f7fd0b13-489f-42b7-a52a-6194fdc9f665" containerName="installer" Mar 19 11:57:16.244103 master-0 kubenswrapper[7454]: E0319 11:57:16.244016 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="77497070-ffa8-45e5-935d-5281828d6962" containerName="extract-content" Mar 19 11:57:16.244103 master-0 kubenswrapper[7454]: E0319 11:57:16.244062 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="77497070-ffa8-45e5-935d-5281828d6962" containerName="registry-server" Mar 19 11:57:16.244103 master-0 kubenswrapper[7454]: E0319 11:57:16.244105 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="db75b266-69c4-4790-82f1-43168b5bb6a0" containerName="extract-utilities" Mar 19 11:57:16.244541 master-0 kubenswrapper[7454]: E0319 11:57:16.244176 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="1370cf76-52c4-4f19-8dfc-794f2901f8a6" containerName="extract-utilities" Mar 19 11:57:16.244541 master-0 kubenswrapper[7454]: E0319 11:57:16.244219 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="903d114c-199f-46f9-b39b-afa52df71ea9" containerName="extract-utilities" Mar 19 11:57:16.244541 master-0 kubenswrapper[7454]: E0319 11:57:16.244261 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="4b49f09f-2efa-4657-9f5a-fbddd42bee0d" containerName="installer" Mar 19 11:57:16.244541 master-0 kubenswrapper[7454]: E0319 11:57:16.244355 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2e4442dc-19e2-42a3-b5d9-7af7765b1939" containerName="installer" Mar 19 11:57:16.244913 master-0 kubenswrapper[7454]: E0319 11:57:16.244567 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="db75b266-69c4-4790-82f1-43168b5bb6a0" containerName="extract-content" Mar 19 11:57:16.244913 master-0 kubenswrapper[7454]: E0319 11:57:16.244615 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="903d114c-199f-46f9-b39b-afa52df71ea9" containerName="extract-content" Mar 19 11:57:16.244913 master-0 kubenswrapper[7454]: E0319 11:57:16.244659 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="1370cf76-52c4-4f19-8dfc-794f2901f8a6" containerName="registry-server" Mar 19 11:57:16.244913 master-0 kubenswrapper[7454]: E0319 11:57:16.244704 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="11f83dfb-da04-483f-b281-ebdb39f3ab27" containerName="installer" Mar 19 11:57:16.244913 master-0 kubenswrapper[7454]: E0319 11:57:16.244756 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="1370cf76-52c4-4f19-8dfc-794f2901f8a6" containerName="extract-content" Mar 19 11:57:16.244913 master-0 kubenswrapper[7454]: E0319 11:57:16.244830 7454 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="632bdf3b-0ba0-4874-a2ec-8396683c35c5" containerName="installer"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215156762265020147 0ustar0000000000000000{"unused_machineconfigs_count":21}config/machineconfigs/rendered-worker-a3e33350292c380cd208fd523f85c2bf.json0000640000000000000000000004053715156762265023770 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8","machineconfiguration.openshift.io/release-image-version":"4.18.35"},"creationTimestamp":"2026-03-19T11:54:52Z","generation":1,"name":"rendered-worker-a3e33350292c380cd208fd523f85c2bf","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"6721bcb7-15e7-4a19-bbd9-c6707feda6e4"}],"resourceVersion":"9184","uid":"19467070-61b2-49da-a038-ac784076f9ae"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:565e3659fe92dfb59b50fd56206af6cad94bcc286825b798c2cf1a98aa8d0c6f","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:53d66d524ca3e787d8dbe30dbc4d9b8612c9cebd505ccb4375a8441814e85422 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a9e8da5c6114f062b814936d4db7a47a04d248e160d6bb28ad4e4a081496ee4 \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f5726322e050cdd4c508be51d2c99a3168eb7535ddc5f2a298df3059ea6c0071"}}config/machineconfigs/rendered-master-fa3672be4c706f8280cf21480935ad94.json0000640000000000000000000004332715156762265023712 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8","machineconfiguration.openshift.io/release-image-version":"4.18.35"},"creationTimestamp":"2026-03-19T11:54:52Z","generation":1,"name":"rendered-master-fa3672be4c706f8280cf21480935ad94","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"cd97e8aa-e72f-4ffb-bd69-68d0b13412a7"}],"resourceVersion":"9189","uid":"6e679052-87bb-4c10-b568-35aababa78e1"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:565e3659fe92dfb59b50fd56206af6cad94bcc286825b798c2cf1a98aa8d0c6f","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:53d66d524ca3e787d8dbe30dbc4d9b8612c9cebd505ccb4375a8441814e85422 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a9e8da5c6114f062b814936d4db7a47a04d248e160d6bb28ad4e4a081496ee4 \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f5726322e050cdd4c508be51d2c99a3168eb7535ddc5f2a298df3059ea6c0071"}}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715156762265017552 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-19T11:54:41Z","not_after":"2028-03-18T11:54:42Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-19T11:54:42Z","not_after":"2028-03-18T11:54:43Z","controllers":[]}]config/clusteroperator/storage.json0000640000000000000000000000346615156762265016331 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"ab2992a9-e286-4b9b-a835-fe97cdf89360","resourceVersion":"4287","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315156762265016675 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"f54e2df5-7d73-4629-83d4-5ece116a59d2","resourceVersion":"5449","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:04Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:01Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:01Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000252415156762265024677 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"83eed792-653f-42f8-a1d6-a4246056aa0c","resourceVersion":"7731","generation":1,"creationTimestamp":"2026-03-19T11:47:50Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:54:41Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:42Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515156762265023473 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"937db819-1623-4f49-9e5e-1b86f2a4e915","resourceVersion":"9600","generation":1,"creationTimestamp":"2026-03-19T11:47:50Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:56:47Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:41Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115156762265022057 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"6fc541dc-cfbb-46d2-890e-7669cfb9ab70","resourceVersion":"7536","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:41Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:41Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315156762265020321 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"53b1a6ce-0c37-4b40-b203-ff4e44507017","resourceVersion":"796","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346115156762265022450 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"dd401c03-2883-4f22-8136-c7047336f924","resourceVersion":"9195","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:51Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:51Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:56Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000000624215156762265020655 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"68cb588a-6e78-4675-8ba5-58e69cbbff02","resourceVersion":"9304","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:00Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:54:09Z","reason":"APIServerDeployment_PodsUpdating","message":"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:54:00Z","reason":"APIServerDeployment_NoPod::APIServices_PreconditionNotReady","message":"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"openshift-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415156762265015444 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"e310d7e8-8aca-4de1-9e45-a4ee7a37739a","resourceVersion":"7118","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:04Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:34Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:34Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:03Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:54:03Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115156762265017103 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"3805fc2f-7458-48c1-b9f7-8d6f298a0560","resourceVersion":"6696","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:24Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.35\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:25Z","reason":"AsExpected","message":"Cluster version is \"4.18.35\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:21Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003615415156762265016356 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"ae338d38-2cfa-4a85-b897-f9b0d0af37bb","resourceVersion":"7792","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-19T11:52:36Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:52:24Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:52:24Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:43Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:46Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-flatfile-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715156762265017047 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"80593c5c-dfc1-4933-a1be-789465203935","resourceVersion":"7472","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:54:41Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:41Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315156762265017144 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"5e0b9733-0bc7-49ac-8640-f7bc5f878eb0","resourceVersion":"7576","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:42Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.35"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:42Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:42Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:42Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000546315156762265017533 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"4b2dfa65-2915-4359-a1a1-5c96ea1a414a","resourceVersion":"10527","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:57:29Z","message":"Cluster version is 4.18.35"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:57:20Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:57:20Z","reason":"AsExpected","message":"Cluster has deployed [{operator 4.18.35} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015}]"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:57:20Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-19T11:57:20Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-image","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"master":"all 1 nodes are at latest configuration rendered-master-fa3672be4c706f8280cf21480935ad94","worker":"all 0 nodes are at latest configuration rendered-worker-a3e33350292c380cd208fd523f85c2bf"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253315156762265020117 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"a3b1b3ef-7c68-4a6a-b29b-d790be99e844","resourceVersion":"10522","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:57:40Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.35"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:57:40Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:57:40Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:57:40Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415156762265017034 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"c2327988-bd20-43b4-9b56-1ae91eb106d6","resourceVersion":"10552","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:57:40Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:57:40Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:57:40Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:57:40Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315156762265022554 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"71a20697-a9ed-4603-976e-a7070219db01","resourceVersion":"4997","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:58Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:58Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615156762265017564 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"ace92199-7e99-4af8-8af3-ce228d3b4dc6","resourceVersion":"6923","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:54:05Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715156762265021405 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"4bec0441-7679-408f-9e2d-25bd4030e5ab","resourceVersion":"7827","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:54:25Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715156762265017612 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"c7be64c4-2ec4-4e94-a021-0cae2b6235bc","resourceVersion":"6858","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:41Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:54:30Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:43Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:41Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-19T11:53:41Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415156762265016504 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"8ed4c43a-5375-4510-babd-9b96ee075a44","resourceVersion":"809","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715156762265016342 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"ddb94bde-4e9c-4939-b84f-db9296a5691e","resourceVersion":"7844","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:43Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:54:42Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:43Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:42Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-19T11:54:42Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715156762265017607 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"fa33541e-9fa4-4f09-890e-615dc0f5b755","resourceVersion":"721","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000470415156762265015600 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"1d79b551-3713-42d9-82c4-716224627018","resourceVersion":"9235","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:54:09Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"},{"name":"etcd","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365615156762265015452 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"27f9eef7-28c5-41b1-95c0-b053236ad000","resourceVersion":"10270","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:57:18Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:57:18Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:57:18Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:21Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"operator","version":"4.18.35"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715156762265021453 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"6f10b589-25a6-4fcb-87d9-aff3a1c20ba6","resourceVersion":"9711","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"csi-snapshot-controller","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263615156762265021633 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"2f5fb246-0af1-4cc5-a30b-c72434878254","resourceVersion":"10415","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:57:23Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:57:23Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:57:23Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:57:23Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215156762265016313 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"890f8cbe-66f9-42eb-be83-7943b21ce226","resourceVersion":"791","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615156762265017753 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"b6c5bf48-cf83-42a8-8f1f-f85dd12a42bc","resourceVersion":"5046","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:59Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000260415156762265020477 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"faeadf6a-7744-4e63-a2ee-f32130e0abe9","resourceVersion":"10511","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:57:39Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:57:39Z"},{"type":"Degraded","status":"True","lastTransitionTime":"2026-03-19T11:57:39Z","reason":"MissingDependency","message":"machine-api not ready"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:57:39Z"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000000346515156762265020102 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"66562dcc-bdbe-40f9-91f0-43444f670f5d","resourceVersion":"774","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"pod-identity-webhook"},{"group":"apps","resource":"deployments","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","name":""},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"","resource":"serviceaccounts","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"","resource":"services","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"pod-identity-webhook"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715156762265021563 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"e65abc61-0ed4-4903-91ee-0610be7f114a","resourceVersion":"812","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015156762265016613 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"370a9ae7-b9aa-4cb6-b4f3-b9fdbf961c78","resourceVersion":"7355","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:40Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:40Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:40Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:54:40Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-19T11:54:40Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000730715156762265017702 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"8dd91956-5352-4edb-987c-c957e1731e02","resourceVersion":"8850","generation":1,"creationTimestamp":"2026-03-19T11:47:48Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:53:50Z","reason":"AsExpected","message":"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.209.16:443/healthz\": dial tcp 172.30.209.16:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-19T11:54:45Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:53:51Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.209.16:443/healthz\": dial tcp 172.30.209.16:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"oauth-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215156762265020213 0ustar0000000000000000[]config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515156762265023234 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115156762265025444 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715156762265025153 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715156762265025144 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315156762265022264 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515156762265026720 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115156762265023423 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115156762265023217 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115156762265025507 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/running_containers.json0000640000000000000000000001077115156762265015332 0ustar0000000000000000{"images":{"0":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","1":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","10":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","11":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","12":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","13":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","14":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","15":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","16":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","17":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","18":"sha256:9174864cd47431966d033d283bc7836e7ca579139ef85c36275db542fda80803","19":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","2":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","20":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","21":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","22":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","23":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","24":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","25":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","26":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","27":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","28":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","29":"registry.redhat.io/redhat/redhat-operator-index:v4.18","3":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","30":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","31":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","32":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","33":"registry.redhat.io/redhat/community-operator-index:v4.18","34":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","35":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","36":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","37":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","38":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","39":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","4":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","40":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","41":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","42":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","43":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","44":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","45":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","46":"registry.redhat.io/redhat/certified-operator-index:v4.18","47":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","48":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","49":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","5":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","50":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","51":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","52":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","53":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","6":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","7":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","8":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","9":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a"},"containers":{"2026-03":{"0":14,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":1,"19":1,"2":8,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"6":4,"7":3,"8":3,"9":2}}}operator-controller-controller-manager-57777556ff-9mpxd.json0000640000000000000000000002474515156762265032265 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-57777556ff-9mpxd","generateName":"operator-controller-controller-manager-57777556ff-","namespace":"openshift-operator-controller","uid":"5238840f-3bef-43ad-ae68-ac187f073019","resourceVersion":"10079","creationTimestamp":"2026-03-19T11:54:17Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"57777556ff"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.40/23\"],\"mac_address\":\"0a:58:0a:80:00:28\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.40/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.40\"\n ],\n \"mac\": \"0a:58:0a:80:00:28\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-57777556ff","uid":"28c16da7-1fbb-406d-8f28-1b9776d106df","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-vxdts","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-vxdts","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-vxdts","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:22Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:17Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:08Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:08Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:17Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.40","podIPs":[{"ip":"10.128.0.40"}],"startTime":"2026-03-19T11:54:17Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-19T11:54:22Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://26af4f815b89151cf9e6736b0f3e5cae3271189cf3655ba8cc103790de35f969","started":true,"volumeMounts":[{"name":"kube-api-access-vxdts","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-19T11:57:02Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ork.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"bfa76afe-287f-44b3-854f-2c98ca111adf\"\nI0319 11:54:50.108197 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"bfa76afe-287f-44b3-854f-2c98ca111adf\"\nE0319 11:55:48.364089 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0319 11:56:48.367694 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0319 11:56:53.851838 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"bc969b16-f1da-4432-b4d8-a9606daca9b8\"\nI0319 11:56:58.429784 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"bc969b16-f1da-4432-b4d8-a9606daca9b8\"\nI0319 11:57:01.358425 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0319 11:57:01.358574 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-19T11:54:21Z","finishedAt":"2026-03-19T11:57:01Z","containerID":"cri-o://387948abcb2cbae673b88cb3d7a8d043f5ef4d37ef318a38ca6b5a6a836dff73"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","containerID":"cri-o://80a4b06853370526b35bd2b1f042248803efc6dea62506012de0886df3162aa5","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-vxdts","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7bd846bfc4-nb8bk.json0000640000000000000000000002523115156762265025522 0ustar0000000000000000{"metadata":{"name":"network-operator-7bd846bfc4-nb8bk","generateName":"network-operator-7bd846bfc4-","namespace":"openshift-network-operator","uid":"284768b8-9d70-4cf7-bace-8adc6b587186","resourceVersion":"9578","creationTimestamp":"2026-03-19T11:51:46Z","labels":{"name":"network-operator","pod-template-hash":"7bd846bfc4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7bd846bfc4","uid":"6018221e-789f-4c8a-81fb-be353623af2b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-8p6vn","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:02f0aa65dfd2a58e13248b4e2078caec450fa2bdbacb3afeb34d1de30c909b0f"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:896642a5bdda0cdbeccb0293d3de85f8882ac72678df8d12fb501fd3367982af"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b6140aa21678d5652c4d09e21eab5dfad35af30902b705c70f72a384e43868ac"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da26695a0ab94eddc0841bf2ed51b30921e2cdc2a9a5acd0d951081de67f1a97"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a22978e1669cdbaeee6ec0800f83559b56a2344f1c003f8cd60f27fac939680e"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8p6vn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:24Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:51:46Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:52:18Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"11:55:23.980766 1 controller.go:239] \"All workers finished\" controller=\"egress-router-controller\"\nI0319 11:55:23.980774 1 controller.go:239] \"All workers finished\" controller=\"dashboard-controller\"\nI0319 11:55:23.980782 1 controller.go:239] \"All workers finished\" controller=\"machineconfig-watcher\"\nI0319 11:55:23.980788 1 controller.go:239] \"All workers finished\" controller=\"allowlist-controller\"\nI0319 11:55:23.980810 1 controller.go:239] \"All workers finished\" controller=\"ingress-config-controller\"\nI0319 11:55:23.980816 1 controller.go:239] \"All workers finished\" controller=\"signer-controller\"\nI0319 11:55:23.980822 1 controller.go:239] \"All workers finished\" controller=\"infrastructureconfig-controller\"\nI0319 11:55:23.980827 1 controller.go:239] \"All workers finished\" controller=\"clusterconfig-controller\"\nI0319 11:55:23.980833 1 controller.go:239] \"All workers finished\" controller=\"proxyconfig-controller\"\nI0319 11:55:23.980838 1 controller.go:239] \"All workers finished\" controller=\"configmap-trust-bundle-injector-controller\"\nI0319 11:55:23.980845 1 controller.go:239] \"All workers finished\" controller=\"pki-controller\"\nI0319 11:55:23.980877 1 dynamic_serving_content.go:149] \"Shutting down controller\" name=\"serving-cert::/tmp/serving-cert-1818796888/tls.crt::/tmp/serving-cert-1818796888/tls.key\"\nI0319 11:55:23.981040 1 base_controller.go:115] Shutting down worker of ConnectivityCheckController controller ...\nI0319 11:55:23.981052 1 base_controller.go:105] All ConnectivityCheckController workers have been terminated\nI0319 11:55:23.981060 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting\nI0319 11:55:23.981072 1 builder.go:329] server exited\nI0319 11:55:28.974123 1 observer_polling.go:162] Shutting down file observer\nF0319 11:55:54.194936 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\n","startedAt":"2026-03-19T11:52:23Z","finishedAt":"2026-03-19T11:55:54Z","containerID":"cri-o://4a5b36532ee146a92740f77707f5b0a6a8c33bb89c0054e1d9177bfea2033a2d"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","containerID":"cri-o://830a4c4455c183de67016fc3718c5a97752f0cfce1dc50148405d7350be95687","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8p6vn","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-wd4nx.json0000640000000000000000000002462715156762265025761 0ustar0000000000000000{"metadata":{"name":"network-node-identity-wd4nx","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"8414b6b0-ee16-47a5-982b-ee58b136cfcf","resourceVersion":"9570","creationTimestamp":"2026-03-19T11:52:55Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5d8cf8bd5d","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"a80f565d-aa39-4760-9461-c63599d44703","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-864rg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-864rg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-864rg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:14Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:52:55Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:52:56Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"03 1 approver.go:230] Finished syncing CSR csr-8lhmc for master-0 node in 7.137654ms\nI0319 11:53:22.099598 1 approver.go:230] Finished syncing CSR csr-8lhmc for unknown node in 89.792µs\nI0319 11:53:22.108005 1 approver.go:230] Finished syncing CSR csr-8lhmc for unknown node in 60.362µs\nI0319 11:53:28.934853 1 recorder.go:104] \"CSR \\\"csr-msk5n\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-msk5n\"} reason=\"CSRApproved\"\nI0319 11:53:28.941141 1 approver.go:230] Finished syncing CSR csr-msk5n for master-0 node in 7.171435ms\nI0319 11:53:28.941304 1 approver.go:230] Finished syncing CSR csr-msk5n for unknown node in 73.572µs\nI0319 11:53:28.947339 1 approver.go:230] Finished syncing CSR csr-msk5n for unknown node in 64.872µs\nE0319 11:55:10.743195 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0319 11:55:25.743120 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0319 11:55:25.743166 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0319 11:55:40.744440 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0319 11:55:40.744703 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-19T11:53:14Z","finishedAt":"2026-03-19T11:55:40Z","containerID":"cri-o://acd01abcc3b9701b51c684ecc460502246e3fa79a2f3e8b56cc2aec4e47bef9f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://10c6078f6bb7ab73c8304b00dbc345f2f9442775840c07f5fbb58265a93f7893","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-864rg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-19T11:53:14Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://9056c1fc7fd95fa7aafeb785b453a91ad0a0bc459dc640aabc135173a8c4a812","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-864rg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215156762265026271 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"3d0b0d16-8cea-4e44-aeb8-db596cf9c976","resourceVersion":"4560","creationTimestamp":"2026-03-19T11:53:22Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.mirror":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.seen":"2026-03-19T11:51:09.971907050Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"538ea3c1-a257-4167-908a-2357320442cc","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:53:50Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:51:13Z","finishedAt":"2026-03-19T11:51:13Z","containerID":"cri-o://b1a54e1d5a4e1d27db12da7c6949a0237da9f713c6a17f5af4237b1c8b03cbfa"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://b1a54e1d5a4e1d27db12da7c6949a0237da9f713c6a17f5af4237b1c8b03cbfa","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-19T11:52:01Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0319 11:51:35.340938 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0319 11:51:35.341064 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0319 11:51:35.342387 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-19T11:51:35Z","finishedAt":"2026-03-19T11:51:35Z","containerID":"cri-o://6b554ade444a2218312faf004411e7ca5ff136f234fd5270edc3b29df56f6e17"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://20d447d60e6c323ac2a99fb9005538b9f698220ad800f2a9d7a82ebdd391df17","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-66b84d69b-btppx.json0000640000000000000000000002432115156762265025375 0ustar0000000000000000{"metadata":{"name":"ingress-operator-66b84d69b-btppx","generateName":"ingress-operator-66b84d69b-","namespace":"openshift-ingress-operator","uid":"b80027fd-7b39-477a-a337-ff9bb08e7eeb","resourceVersion":"9587","creationTimestamp":"2026-03-19T11:51:46Z","labels":{"name":"ingress-operator","pod-template-hash":"66b84d69b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-66b84d69b","uid":"6fd06410-5792-4f37-ba67-cc6e90cdf1da","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-hs4jf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-hs4jf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-hs4jf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-19T11:53:37Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"n event from the watch stream: context canceled\") has prevented the request from succeeding\nW0319 11:56:42.208916 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.CustomResourceDefinition ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0319 11:56:42.208932 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.IngressController ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-19T11:56:42.208Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\nW0319 11:56:42.209003 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Service ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-19T11:56:42.209Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\nW0319 11:56:42.209024 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.RoleBinding ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-19T11:56:42.209Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-19T11:56:42.209Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-03-19T11:56:42.214Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-03-19T11:56:42.214Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-03-19T11:54:40Z","finishedAt":"2026-03-19T11:56:42Z","containerID":"cri-o://85ef4c835912214d79ee0e2491e95c939671fab04307a1604919b04165567448"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","containerID":"cri-o://ff92d05d103782a47d08e29aa2fb79e226a87a90f33dcfc9e8b5555e427f0ce4","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-hs4jf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-19T11:54:41Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://200a06c899a0965df44a32ca37904722fe84e2d824b3e5f590ceb43f513d3c8b","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-hs4jf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-8c94f4649-gx4w8.json0000640000000000000000000001661015156762265033331 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8c94f4649-gx4w8","generateName":"openshift-controller-manager-operator-8c94f4649-","namespace":"openshift-controller-manager-operator","uid":"9ed2dbd1-aec4-4009-917a-933533912ab5","resourceVersion":"10078","creationTimestamp":"2026-03-19T11:51:45Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8c94f4649"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8c94f4649","uid":"e6d11f59-60cb-40d8-87c7-a80468b7e454","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-gsk9d","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gsk9d","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c10"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:06Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:06Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2026-03-19T11:53:37Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-19T11:57:05Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0319 11:55:23.338249 1 cmd.go:253] Using service-serving-cert provided certificates\nI0319 11:55:23.338447 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0319 11:55:23.339191 1 observer_polling.go:159] Starting file observer\nW0319 11:56:23.345759 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8c94f4649-gx4w8)\nI0319 11:56:23.346117 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0319 11:56:53.806324 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-19T11:55:23Z","finishedAt":"2026-03-19T11:56:53Z","containerID":"cri-o://24fd9caa7952430318d8f0070bff5d8f9a23ccd510c898e8d4b008fdb27da600"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","containerID":"cri-o://0cb96d6164884cc3f0bac4337734cdc20f98a5daca48411010d7f82e0122afa1","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gsk9d","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-config-operator/openshift-config-operator-95bf4f4d-nhvl4.json0000640000000000000000000002141015156762265026643 0ustar0000000000000000{"metadata":{"name":"openshift-config-operator-95bf4f4d-nhvl4","generateName":"openshift-config-operator-95bf4f4d-","namespace":"openshift-config-operator","uid":"aef8e03f-0363-4e13-b7ca-4fa871d77c62","resourceVersion":"9746","creationTimestamp":"2026-03-19T11:51:45Z","labels":{"app":"openshift-config-operator","pod-template-hash":"95bf4f4d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.29/23\"],\"mac_address\":\"0a:58:0a:80:00:1d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.29/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.29\"\n ],\n \"mac\": \"0a:58:0a:80:00:1d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-config-operator-95bf4f4d","uid":"a90fafdd-958e-42b3-98f3-ccf597fd796a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"config-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"available-featuregates","emptyDir":{"sizeLimit":"100Mi"}},{"name":"kube-api-access-x252z","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"openshift-api","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","command":["write-available-featuresets","--asset-output-dir=/available-featuregates","--payload-version=$(OPERATOR_IMAGE_VERSION)"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-x252z","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"containers":[{"name":"openshift-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","command":["cluster-config-operator","operator","--operator-version=$(OPERATOR_IMAGE_VERSION)","--authoritative-feature-gate-dir=/available-featuregates"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-x252z","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-config-operator","serviceAccount":"openshift-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:59Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:56:59Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.29","podIPs":[{"ip":"10.128.0.29"}],"startTime":"2026-03-19T11:53:37Z","initContainerStatuses":[{"name":"openshift-api","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-19T11:53:48Z","finishedAt":"2026-03-19T11:53:48Z","containerID":"cri-o://583df0d35b75cdd42a8c5d73920d4fc8b3684739b4fbdc9aa3860b1cc1087eeb"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","containerID":"cri-o://583df0d35b75cdd42a8c5d73920d4fc8b3684739b4fbdc9aa3860b1cc1087eeb","started":false,"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-x252z","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"openshift-config-operator","state":{"running":{"startedAt":"2026-03-19T11:56:48Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0319 11:56:00.959921 1 cmd.go:250] Using service-serving-cert provided certificates\nI0319 11:56:00.960080 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0319 11:56:00.960408 1 observer_polling.go:159] Starting file observer\nI0319 11:56:47.610242 1 builder.go:298] config-operator version 4.18.0-202602261953.p2.gfe5e928.assembly.stream.el9-fe5e928-fe5e928628200b49a07aa50e4dfa634fb9452607\nI0319 11:56:47.647493 1 cmd.go:138] Received SIGTERM or SIGINT signal, shutting down controller.\nF0319 11:56:48.114516 1 cmd.go:179] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-03-19T11:56:00Z","finishedAt":"2026-03-19T11:56:48Z","containerID":"cri-o://2e74e767e3ac9aff0d456d8d8b27b05725691d9b35635b73f0381a2cb7166772"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","containerID":"cri-o://a149e2c842ba9b9ace54d5db12650852f1ae471a53fa714afaa548530c82918e","started":true,"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-x252z","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-6m654.json0000640000000000000000000001670315156762265030140 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-64854d9cff-6m654","generateName":"csi-snapshot-controller-64854d9cff-","namespace":"openshift-cluster-storage-operator","uid":"944eac68-e72b-4aed-b5dc-d7d9703178a3","resourceVersion":"10073","creationTimestamp":"2026-03-19T11:53:49Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"64854d9cff"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.30/23\"],\"mac_address\":\"0a:58:0a:80:00:1e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.30/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.30\"\n ],\n \"mac\": \"0a:58:0a:80:00:1e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-64854d9cff","uid":"73ff88b7-df55-41a3-8d43-f682aa740439","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-m2mdn","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-m2mdn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000160000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsNonRoot":true,"fsGroup":1000160000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:53:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.30","podIPs":[{"ip":"10.128.0.30"}],"startTime":"2026-03-19T11:53:49Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-19T11:57:04Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler-leader\nI0319 11:53:58.764764 1 leader_election.go:184] \"became leader, starting\"\nI0319 11:53:58.764968 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0319 11:53:58.765006 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0319 11:53:58.765670 1 snapshot_controller_base.go:255] Starting snapshot controller\nI0319 11:53:58.766963 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotClass from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0319 11:53:58.767220 1 reflector.go:368] Caches populated for *v1.VolumeSnapshot from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0319 11:53:58.767393 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160\nI0319 11:53:58.767448 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotContent from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0319 11:53:58.767982 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160\nE0319 11:55:51.019515 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0319 11:56:51.022414 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-storage-operator/snapshot-controller-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io snapshot-controller-leader)\nI0319 11:57:04.018248 1 leaderelection.go:297] failed to renew lease openshift-cluster-storage-operator/snapshot-controller-leader: timed out waiting for the condition\nE0319 11:57:04.018310 1 leader_election.go:188] \"Stopped leading\"\n","startedAt":"2026-03-19T11:53:58Z","finishedAt":"2026-03-19T11:57:04Z","containerID":"cri-o://bdf696c39db6c9beaa009fbd69e576a7d8040c99b8de9bd67204a49a32f0a1ba"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","containerID":"cri-o://7b0aee976f8444b82e3c4d17e235fff6c9975468ebf15542296951ae3166eacc","started":true,"volumeMounts":[{"name":"kube-api-access-m2mdn","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-6864dc98f7-j2w8z.json0000640000000000000000000002541015156762265025641 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-6864dc98f7-j2w8z","generateName":"catalogd-controller-manager-6864dc98f7-","namespace":"openshift-catalogd","uid":"919daf8d-763a-44bc-8916-86b425a27cbd","resourceVersion":"10080","creationTimestamp":"2026-03-19T11:54:17Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"6864dc98f7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.41/23\"],\"mac_address\":\"0a:58:0a:80:00:29\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.41/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.41\"\n ],\n \"mac\": \"0a:58:0a:80:00:29\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-6864dc98f7","uid":"a278f95e-a5af-4ea8-a2e7-12e6145a3562","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-8brwr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-8brwr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-8brwr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:24Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:17Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:09Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:57:09Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:17Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.41","podIPs":[{"ip":"10.128.0.41"}],"startTime":"2026-03-19T11:54:17Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-19T11:54:21Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://d2d6a8de6820bede4da4ce3d6a3c3b9da035057124818c5512ee72e31ef2f19c","started":true,"volumeMounts":[{"name":"kube-api-access-8brwr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-19T11:57:02Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"58662560-03a9-4ba7-9649-df375455be31\" ref=\"registry.redhat.io/redhat/redhat-marketplace-index:v4.18\" digest=\"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331\"\nI0319 11:56:59.046952 1 containers_image.go:299] \"unpacking image\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"58662560-03a9-4ba7-9649-df375455be31\" path=\"/var/cache/unpack/openshift-redhat-marketplace/sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331\"\nI0319 11:57:00.500058 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"58662560-03a9-4ba7-9649-df375455be31\" layer=0\nI0319 11:57:01.467600 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"58662560-03a9-4ba7-9649-df375455be31\" layer=1\nI0319 11:57:01.643468 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"58662560-03a9-4ba7-9649-df375455be31\" layer=2\nI0319 11:57:02.211351 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0319 11:57:02.211484 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-19T11:54:22Z","finishedAt":"2026-03-19T11:57:02Z","containerID":"cri-o://b41786c9c913f59caa3ab9f044ef31b0ba5e946f6fab91d0cf640d642dc24031"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","containerID":"cri-o://48baf89d0a5776fb35854b24f12ca1544d0d250398de394c850b09cf7a229ce1","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8brwr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315156762265023461 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"c3689f59-8e26-428b-9db2-a2ed70df4124","resourceVersion":"4087","generation":1,"creationTimestamp":"2026-03-19T11:53:49Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015156762265022064 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"37a5e88a-38e4-4b73-a818-ca3ae1b6f3dc","resourceVersion":"4052","generation":1,"creationTimestamp":"2026-03-19T11:53:49Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-19T11:53:49Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/pod/openshift-cluster-version/cluster-version-operator-7d58488df-czxxt.json0000640000000000000000000001341415156762265026763 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-7d58488df-czxxt","generateName":"cluster-version-operator-7d58488df-","namespace":"openshift-cluster-version","uid":"3661faaa-2c9d-4fcd-a41f-71aa71a2e464","resourceVersion":"7752","creationTimestamp":"2026-03-19T11:54:41Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"7d58488df"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-7d58488df","uid":"175296cc-3cb9-4c5c-869f-571a5066b254","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:41Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-19T11:54:41Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-19T11:54:41Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-19T11:54:42Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","containerID":"cri-o://7da17bb33a379d340800eed592826e40470a02d8d02148c7a5b5f440bb389db1","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415156762265011041 0ustar0000000000000000c4402f12-5c47-430a-837d-0227eec125f7config/version.json0000640000000000000000000000716215156762265013112 0ustar0000000000000000{"metadata":{"name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","resourceVersion":"10450","generation":2,"creationTimestamp":"2026-03-19T11:47:21Z"},"spec":{"clusterID":"c4402f12-5c47-430a-837d-0227eec125f7","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","url":"https://access.redhat.com/errata/RHSA-2026:3905","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-19T11:47:48Z","completionTime":null,"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","verified":false}],"observedGeneration":2,"versionHash":"Uw6h6T7stl0=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-19T11:47:48Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-19T11:47:48Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-19T11:47:48Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-19T11:47:48Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-19T11:47:48Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-19T11:57:17Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, cloud-controller-manager, cloud-credential, cluster-autoscaler, control-plane-machine-set, dns, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): resource may have been deleted\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-19T11:47:48Z","reason":"MultipleErrors","message":"Unable to apply 4.18.35: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/ingress.json0000640000000000000000000000043615156762265013074 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"deb884e9-d8f1-48b7-bb46-62aaf6330be9","resourceVersion":"553","generation":1,"creationTimestamp":"2026-03-19T11:47:16Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/image.json0000640000000000000000000000111715156762265012501 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"fcfde781-dd6b-4096-8f08-f7da406803e1","resourceVersion":"1554","generation":1,"creationTimestamp":"2026-03-19T11:48:05Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/machineconfigpools/worker.json0000640000000000000000000001013415156762265016576 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-19T11:54:25Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"9609","uid":"6721bcb7-15e7-4a19-bbd9-c6707feda6e4"},"spec":{"configuration":{"name":"rendered-worker-a3e33350292c380cd208fd523f85c2bf","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-16T11:36:28Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-20T11:43:21Z","subject":"CN=kube-csr-signer_@1773921232"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-20T11:43:21Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-19T11:43:21Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-19T11:43:21Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-16T11:43:19Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-19T11:53:43Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773921223"}],"conditions":[{"lastTransitionTime":"2026-03-19T11:54:54Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-19T11:56:50Z","message":"All nodes are updated with MachineConfig rendered-worker-a3e33350292c380cd208fd523f85c2bf","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-19T11:56:50Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-19T11:56:50Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-19T11:56:50Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-worker-a3e33350292c380cd208fd523f85c2bf","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":2,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000001240715156762265016565 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-19T11:54:25Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"9610","uid":"cd97e8aa-e72f-4ffb-bd69-68d0b13412a7"},"spec":{"configuration":{"name":"rendered-master-fa3672be4c706f8280cf21480935ad94","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-16T11:36:28Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-20T11:43:21Z","subject":"CN=kube-csr-signer_@1773921232"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-20T11:43:21Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-19T11:43:21Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-19T11:43:21Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-16T11:43:19Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-19T11:53:43Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773921223"}],"conditions":[{"lastTransitionTime":"2026-03-19T11:54:54Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-19T11:56:50Z","message":"All nodes are updated with MachineConfig rendered-master-fa3672be4c706f8280cf21480935ad94","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-19T11:56:50Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-19T11:56:50Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-19T11:56:50Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-master-fa3672be4c706f8280cf21480935ad94","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"degradedMachineCount":0,"machineCount":1,"observedGeneration":2,"readyMachineCount":1,"unavailableMachineCount":0,"updatedMachineCount":1}}config/featuregate.json0000640000000000000000000000613615156762265013721 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"7a6dd5aa-c38c-494e-89f3-cc8e72d338e3","resourceVersion":"646","generation":1,"creationTimestamp":"2026-03-19T11:47:37Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.35","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515156762265025137 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"11a7bd24-945c-4307-805f-169e344ad853","resourceVersion":"8115","generation":1,"creationTimestamp":"2026-03-19T11:48:07Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-19T11:54:46Z","reason":"SufficientPods","message":""}]}}config/oauth.json0000640000000000000000000000114415156762265012537 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"963c284a-19c8-458a-a4f0-34e97ae5af1e","resourceVersion":"1697","generation":1,"creationTimestamp":"2026-03-19T11:48:08Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/authentication.json0000640000000000000000000000116515156762265014441 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"35dd9f93-f1fd-46f4-b08b-b028b9d0be7b","resourceVersion":"1130","generation":1,"creationTimestamp":"2026-03-19T11:47:56Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/infrastructure.json0000640000000000000000000000106515156762265014501 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"4cd2ea9a-258a-4617-a40f-06b548a388f3","resourceVersion":"539","generation":1,"creationTimestamp":"2026-03-19T11:47:15Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615156762265025517 0ustar0000000000000000{"metadata":{"name":"edit","uid":"b6d6efd9-d9b3-4758-917c-3218d838556b","resourceVersion":"8168","creationTimestamp":"2026-03-19T11:46:22Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315156762265025660 0ustar0000000000000000{"metadata":{"name":"admin","uid":"6f941296-8053-4840-ba4a-bf596b275fbe","resourceVersion":"8172","creationTimestamp":"2026-03-19T11:46:22Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615156762265027515 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"35a1fd65-3839-4f74-bada-2798dc4bf9aa","resourceVersion":"5810","generation":2,"creationTimestamp":"2026-03-19T11:54:09Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/schedulers/cluster.json0000640000000000000000000000052415156762265015242 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"bc0eb8a0-cb4f-4217-8bab-bcb5b2dfdec5","resourceVersion":"562","generation":1,"creationTimestamp":"2026-03-19T11:47:18Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/proxy.json0000640000000000000000000000031315156762265012575 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"19a4fefe-3ec9-4343-9813-0b7b82f4e5fc","resourceVersion":"557","generation":1,"creationTimestamp":"2026-03-19T11:47:17Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/apiserver.json0000640000000000000000000000121615156762265013417 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"ab3b4d03-59f4-4c9b-b6db-560a58c01382","resourceVersion":"964","generation":1,"creationTimestamp":"2026-03-19T11:47:52Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/network.json0000640000000000000000000000117015156762265013107 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"190713b6-1424-4487-8fe4-ab69d1ae3631","resourceVersion":"3337","generation":2,"creationTimestamp":"2026-03-19T11:47:17Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/node/master-0.json0000640000000000000000000000676315156762265014010 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"538ea3c1-a257-4167-908a-2357320442cc","resourceVersion":"10461","creationTimestamp":"2026-03-19T11:51:43Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-fa3672be4c706f8280cf21480935ad94","machineconfiguration.openshift.io/desiredConfig":"rendered-master-fa3672be4c706f8280cf21480935ad94","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-fa3672be4c706f8280cf21480935ad94","machineconfiguration.openshift.io/lastAppliedDrain":"uncordon-rendered-master-fa3672be4c706f8280cf21480935ad94","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"10429","machineconfiguration.openshift.io/reason":"","machineconfiguration.openshift.io/state":"Done","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865356Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714380Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-19T11:57:38Z","lastTransitionTime":"2026-03-19T11:51:43Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-19T11:57:38Z","lastTransitionTime":"2026-03-19T11:51:43Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-19T11:57:38Z","lastTransitionTime":"2026-03-19T11:51:43Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-19T11:57:38Z","lastTransitionTime":"2026-03-19T11:53:36Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.113.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202603021444-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"runc","features":{"recursiveReadOnlyMounts":true}},{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}}]}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115156762265027765 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"72dc6f97-e814-427e-a184-ad5e2f8f7f3a","resourceVersion":"6502","generation":1,"creationTimestamp":"2026-03-19T11:54:21Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-19T11:54:22Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-19T11:54:22Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-19T11:54:22Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-19T11:54:22Z","reason":"AsExpected"}]}}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515156762265025747 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"544dd9b4-6ff9-4deb-af85-1464283c9b57","resourceVersion":"10284","generation":2,"creationTimestamp":"2026-03-19T11:57:19Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115156762265025313 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"862a6f97-1a1e-4693-afab-a57465644c3a","resourceVersion":"5376","generation":2,"creationTimestamp":"2026-03-19T11:48:16Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515156762265026752 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"52231c0f-46c3-4735-b4c5-24448746e8c9","resourceVersion":"7290","generation":1,"creationTimestamp":"2026-03-19T11:54:39Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"4967de4b-de62-413f-8d66-6ab62f71fcb2","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715156762265024040 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"e886cb2e-d18d-4bb4-87f2-1a1c8b1bff2b","resourceVersion":"5377","generation":2,"creationTimestamp":"2026-03-19T11:52:39Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"4967de4b-de62-413f-8d66-6ab62f71fcb2","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315156762265030653 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"cd285c50-0c22-4f14-a581-2b3148292fc1","resourceVersion":"10451","generation":2,"creationTimestamp":"2026-03-19T11:57:32Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"91021bc4-d854-476a-95db-c61b543f7781","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115156762265032123 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"9be669b9-383a-46b3-9da5-1656c621cc0d","resourceVersion":"7357","generation":2,"creationTimestamp":"2026-03-19T11:54:40Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715156762265025011 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"cd286fd3-6ecd-4b12-a34c-876ee7f5afdb","resourceVersion":"10510","generation":2,"creationTimestamp":"2026-03-19T11:57:39Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315156762265026515 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"d1092748-a300-422b-b6a7-3e549079896f","resourceVersion":"10287","generation":2,"creationTimestamp":"2026-03-19T11:57:19Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}