Name:             loki-operator-controller-manager-7c7d667b45-kx8bw
Namespace:        openshift-operators-redhat
Priority:         0
Service Account:  loki-operator-controller-manager
Node:             crc/192.168.126.11
Start Time:       Wed, 18 Feb 2026 14:11:00 +0000
Labels:           app.kubernetes.io/managed-by=operator-lifecycle-manager
                  app.kubernetes.io/name=loki-operator
                  app.kubernetes.io/part-of=cluster-logging
                  name=loki-operator-controller-manager
                  pod-template-hash=7c7d667b45
Annotations:      alm-examples:
                    [
                      {
                        "apiVersion": "loki.grafana.com/v1",
                        "kind": "AlertingRule",
                        "metadata": {
                          "name": "alertingrule-sample"
                        },
                        "spec": {
                          "groups": [
                            {
                              "interval": "10m",
                              "name": "alerting-rules-group",
                              "rules": [
                                {
                                  "alert": "HighPercentageError",
                                  "annotations": {
                                    "summary": "High request latency"
                                  },
                                  "expr": "sum(rate({app=\"foo\", env=\"production\"} |= \"error\" [5m])) by (job)\n  /\nsum(rate({app=\"foo\", env=\"producti...
                                  "for": "10m",
                                  "labels": {
                                    "severity": "page"
                                  }
                                },
                                {
                                  "alert": "HttpCredentialsLeaked",
                                  "annotations": {
                                    "message": "{{ $labels.job }} is leaking http basic auth credentials."
                                  },
                                  "expr": "sum by (cluster, job, pod) (count_over_time({namespace=\"prod\"} |~ \"http(s?)://(\\\\w+):(\\\\w+)@\" [5m]) \u003e ...
                                  "for": "10m",
                                  "labels": {
                                    "severity": "critical"
                                  }
                                }
                              ]
                            }
                          ],
                          "tenantID": "test-tenant"
                        }
                      },
                      {
                        "apiVersion": "loki.grafana.com/v1",
                        "kind": "LokiStack",
                        "metadata": {
                          "name": "lokistack-sample"
                        },
                        "spec": {
                          "size": "1x.small",
                          "storage": {
                            "secret": {
                              "name": "test"
                            }
                          },
                          "storageClassName": "standard"
                        }
                      },
                      {
                        "apiVersion": "loki.grafana.com/v1",
                        "kind": "RecordingRule",
                        "metadata": {
                          "name": "recordingrule-sample"
                        },
                        "spec": {
                          "groups": [
                            {
                              "interval": "10m",
                              "name": "recording-rules-group",
                              "rules": [
                                {
                                  "expr": "sum(rate({container=\"myservice\"}[10m]))\n",
                                  "record": "myservice:requests:rate10m"
                                },
                                {
                                  "expr": "sum(rate({container=\"otherservice\"}[1m]))\n",
                                  "record": "otherservice:requests:rate1m"
                                }
                              ]
                            }
                          ],
                          "tenantID": "test-tenant"
                        }
                      },
                      {
                        "apiVersion": "loki.grafana.com/v1",
                        "kind": "RulerConfig",
                        "metadata": {
                          "name": "rulerconfig-sample"
                        },
                        "spec": {
                          "alertmanager": {
                            "discovery": {
                              "enableSRV": true,
                              "refreshInterval": "1m"
                            },
                            "enableV2": true,
                            "endpoints": [
                              "http://alertmanager-host1.mycompany.org",
                              "http://alertmanager-host2.mycompany.org"
                            ],
                            "externalLabels": {
                              "environment": "production",
                              "region": "us-east-2"
                            },
                            "externalUrl": "http://www.mycompany.org/alerts",
                            "notificationQueue": {
                              "capacity": 1000,
                              "forGracePeriod": "10m",
                              "forOutageTolerance": "1h",
                              "resendDelay": "1m",
                              "timeout": "30s"
                            }
                          },
                          "evaluationInterval": "1m",
                          "pollInterval": "1m",
                          "remoteWrite": {
                            "client": {
                              "authorization": "basic",
                              "authorizationSecretName": "my-secret-resource",
                              "name": "remote-write-log-metrics",
                              "proxyUrl": "http://proxy-host.mycompany.org",
                              "relabelConfigs": [
                                {
                                  "action": "replace",
                                  "regex": "ALERTS.*",
                                  "replacement": "$1",
                                  "separator": "",
                                  "sourceLabels": [
                                    "labelc",
                                    "labeld"
                                  ],
                                  "targetLabel": "labelnew"
                                }
                              ],
                              "timeout": "30s",
                              "url": "http://remote-write-host.mycompany.org"
                            },
                            "enabled": true,
                            "refreshPeriod": "10s"
                          }
                        }
                      }
                    ]
                  capabilities: Full Lifecycle
                  categories: OpenShift Optional, Logging & Tracing
                  certified: false
                  com.redhat.delivery.appregistry: false
                  com.redhat.delivery.operator.bundle: true
                  com.redhat.openshift.versions: v4.16-v4.20
                  containerImage:
                    registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:8569cbaa0d98822a80d629ed60cc80b5100607e5a2430018f2e3d3bb5fa9ee9e
                  createdAt: 2025-03-06T11:32:52Z
                  description:
                    The Loki Operator for OCP provides a means for configuring and managing a Loki stack for cluster logging.
                    ## Prerequisites and Requirements
                    ### Loki Operator Namespace
                    The Loki Operator must be deployed to the global operator group namespace `openshift-operators-redhat`.
                    ### Memory Considerations
                    Loki is a memory intensive application.  The initial
                    set of OCP nodes may not be large enough to support the Loki stack.  Additional OCP nodes must be added
                    to the OCP cluster if you desire to run with the recommended (or better) memory.
                  features.operators.openshift.io/cnf: false
                  features.operators.openshift.io/cni: false
                  features.operators.openshift.io/csi: false
                  features.operators.openshift.io/disconnected: true
                  features.operators.openshift.io/fips-compliant: true
                  features.operators.openshift.io/proxy-aware: true
                  features.operators.openshift.io/tls-profiles: true
                  features.operators.openshift.io/token-auth-aws: true
                  features.operators.openshift.io/token-auth-azure: true
                  features.operators.openshift.io/token-auth-gcp: true
                  k8s.ovn.org/pod-networks:
                    {"default":{"ip_addresses":["10.217.0.48/23"],"mac_address":"0a:58:0a:d9:00:30","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0...
                  k8s.v1.cni.cncf.io/network-status:
                    [{
                        "name": "ovn-kubernetes",
                        "interface": "eth0",
                        "ips": [
                            "10.217.0.48"
                        ],
                        "mac": "0a:58:0a:d9:00:30",
                        "default": true,
                        "dns": {}
                    }]
                  kubectl.kubernetes.io/default-container: manager
                  olm.operatorGroup: loki-operator
                  olm.operatorNamespace: openshift-operators-redhat
                  olm.skipRange: >=6.0.0-0 <6.2.8
                  olm.targetNamespaces: 
                  olmcahash: aed78850c62305f05d8841c77ad359bb886c7526483afbf9214baafe8594e52d
                  openshift.io/scc: restricted-v2
                  operatorframework.io/cluster-monitoring: true
                  operatorframework.io/properties:
                    {"properties":[{"type":"olm.gvk","value":{"group":"loki.grafana.com","kind":"AlertingRule","version":"v1"}},{"type":"olm.gvk","value":{"gr...
                  operatorframework.io/suggested-namespace: openshift-operators-redhat
                  operators.openshift.io/valid-subscription: ["OpenShift Container Platform", "OpenShift Platform Plus"]
                  operators.operatorframework.io.bundle.channel.default.v1: stable-6.2
                  operators.operatorframework.io.bundle.channels.v1: stable-6.2
                  operators.operatorframework.io.bundle.manifests.v1: manifests/
                  operators.operatorframework.io.bundle.mediatype.v1: registry+v1
                  operators.operatorframework.io.bundle.metadata.v1: metadata/
                  operators.operatorframework.io.bundle.package.v1: loki-operator
                  operators.operatorframework.io.metrics.mediatype.v1: metrics+v1
                  operators.operatorframework.io.metrics.project_layout: go.kubebuilder.io/v4
                  operators.operatorframework.io.test.config.v1: tests/scorecard/
                  operators.operatorframework.io.test.mediatype.v1: scorecard+v1
                  operators.operatorframework.io/builder: operator-sdk-unknown
                  operators.operatorframework.io/project_layout: go.kubebuilder.io/v4
                  seccomp.security.alpha.kubernetes.io/pod: runtime/default
                  support: AOS Cluster Logging
Status:           Running
SeccompProfile:   RuntimeDefault
IP:               10.217.0.48
IPs:
  IP:           10.217.0.48
Controlled By:  ReplicaSet/loki-operator-controller-manager-7c7d667b45
Containers:
  manager:
    Container ID:  cri-o://b6c27ac8b74af2cdee13930c50556fa3bb6aee4a701357ae58cc42f5641ac48e
    Image:         registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:8569cbaa0d98822a80d629ed60cc80b5100607e5a2430018f2e3d3bb5fa9ee9e
    Image ID:      registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:8569cbaa0d98822a80d629ed60cc80b5100607e5a2430018f2e3d3bb5fa9ee9e
    Ports:         9443/TCP, 8080/TCP
    Host Ports:    0/TCP, 0/TCP
    Command:
      /manager
    Args:
      --config=controller_manager_config.yaml
    State:          Running
      Started:      Wed, 18 Feb 2026 15:17:53 +0000
    Last State:     Terminated
      Reason:       Error
      Exit Code:    1
      Started:      Wed, 18 Feb 2026 14:11:02 +0000
      Finished:     Wed, 18 Feb 2026 15:17:52 +0000
    Ready:          True
    Restart Count:  1
    Liveness:       http-get http://:8081/healthz delay=15s timeout=1s period=20s #success=1 #failure=3
    Readiness:      http-get http://:8081/readyz delay=5s timeout=1s period=10s #success=1 #failure=3
    Environment:
      RELATED_IMAGE_LOKI:       registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:c9e7d4b4842e9a0a7f74b2a010c3cfdb433fa00b73ca7a1b86a56c935cdb633d
      RELATED_IMAGE_GATEWAY:    registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:0460d39f2624e731821734a679b0235240dc8e107a1986acc8197ab377f628ed
      RELATED_IMAGE_OPA:        registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:13cd0be568d2cac6058c41fb774f1baafc03dc696d57d0eaa612db681818653d
      OPERATOR_CONDITION_NAME:  loki-operator.v6.2.8
    Mounts:
      /apiserver.local.config/certificates from apiservice-cert (rw)
      /controller_manager_config.yaml from manager-config (rw,path="controller_manager_config.yaml")
      /tmp/k8s-webhook-server/serving-certs from webhook-cert (rw)
      /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-87brw (ro)
  kube-rbac-proxy:
    Container ID:  cri-o://0f5a58e0edf17e924bc5e9579db08cf06cfce905915b2baf102218a6b7254d1c
    Image:         registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9:v4.20@sha256:883be225980cafa658d73b7d87ac99a39dce0fa8fb7754158ec28dc218bc903d
    Image ID:      registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9@sha256:192f9723e6eb3651a3fc7aa6dd604eb9aaafb668606a2078e233b33d4f53609b
    Port:          8443/TCP
    Host Port:     0/TCP
    Args:
      --secure-listen-address=0.0.0.0:8443
      --upstream=http://127.0.0.1:8080/
      --logtostderr=true
      --tls-cert-file=/var/run/secrets/serving-cert/tls.crt
      --tls-private-key-file=/var/run/secrets/serving-cert/tls.key
      --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_CBC_SHA256
      --tls-min-version=VersionTLS12
      --v=0
    State:          Running
      Started:      Wed, 18 Feb 2026 14:11:08 +0000
    Ready:          True
    Restart Count:  0
    Environment:
      OPERATOR_CONDITION_NAME:  loki-operator.v6.2.8
    Mounts:
      /apiserver.local.config/certificates from apiservice-cert (rw)
      /tmp/k8s-webhook-server/serving-certs from webhook-cert (rw)
      /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-87brw (ro)
      /var/run/secrets/serving-cert from loki-operator-metrics-cert (rw)
Conditions:
  Type                        Status
  PodReadyToStartContainers   True 
  Initialized                 True 
  Ready                       True 
  ContainersReady             True 
  PodScheduled                True 
Volumes:
  manager-config:
    Type:      ConfigMap (a volume populated by a ConfigMap)
    Name:      loki-operator-manager-config
    Optional:  false
  loki-operator-metrics-cert:
    Type:        Secret (a volume populated by a Secret)
    SecretName:  loki-operator-metrics
    Optional:    true
  apiservice-cert:
    Type:        Secret (a volume populated by a Secret)
    SecretName:  loki-operator-controller-manager-service-cert
    Optional:    false
  webhook-cert:
    Type:        Secret (a volume populated by a Secret)
    SecretName:  loki-operator-controller-manager-service-cert
    Optional:    false
  kube-api-access-87brw:
    Type:                    Projected (a volume that contains injected data from multiple sources)
    TokenExpirationSeconds:  3607
    ConfigMapName:           kube-root-ca.crt
    ConfigMapOptional:       <nil>
    DownwardAPI:             true
    ConfigMapName:           openshift-service-ca.crt
    ConfigMapOptional:       <nil>
QoS Class:                   BestEffort
Node-Selectors:              kubernetes.io/os=linux
Tolerations:                 node.kubernetes.io/not-ready:NoExecute op=Exists for 300s
                             node.kubernetes.io/unreachable:NoExecute op=Exists for 300s
Events:
  Type     Reason          Age   From               Message
  ----     ------          ----  ----               -------
  Normal   Scheduled       72m   default-scheduler  Successfully assigned openshift-operators-redhat/loki-operator-controller-manager-7c7d667b45-kx8bw to crc
  Normal   AddedInterface  72m   multus             Add eth0 [10.217.0.48/23] from ovn-kubernetes
  Normal   Pulling         72m   kubelet            Pulling image "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:8569cbaa0d98822a80d629ed60cc80b5100607e5a2430018f2e3d3bb5fa9ee9e"
  Normal   Pulling         72m   kubelet            Pulling image "registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9:v4.20@sha256:883be225980cafa658d73b7d87ac99a39dce0fa8fb7754158ec28dc218bc903d"
  Normal   Pulled          72m   kubelet            Successfully pulled image "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:8569cbaa0d98822a80d629ed60cc80b5100607e5a2430018f2e3d3bb5fa9ee9e" in 2.083s (2.083s including waiting). Image size: 186851746 bytes.
  Normal   Pulled          72m   kubelet            Successfully pulled image "registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9:v4.20@sha256:883be225980cafa658d73b7d87ac99a39dce0fa8fb7754158ec28dc218bc903d" in 5.261s (5.261s including waiting). Image size: 462947286 bytes.
  Normal   Created         72m   kubelet            Created container kube-rbac-proxy
  Normal   Started         72m   kubelet            Started container kube-rbac-proxy
  Warning  ProbeError      6m5s  kubelet            Liveness probe error: Get "http://10.217.0.48:8081/healthz": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
body:
  Warning  Unhealthy   6m5s                  kubelet  Liveness probe failed: Get "http://10.217.0.48:8081/healthz": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
  Warning  ProbeError  5m55s (x2 over 6m5s)  kubelet  Readiness probe error: Get "http://10.217.0.48:8081/readyz": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
body:
  Warning  Unhealthy  5m55s (x2 over 6m5s)  kubelet  Readiness probe failed: Get "http://10.217.0.48:8081/readyz": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
  Normal   Created    5m53s (x2 over 72m)   kubelet  Created container manager
  Normal   Started    5m53s (x2 over 72m)   kubelet  Started container manager
  Normal   Pulled     5m53s                 kubelet  Container image "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:8569cbaa0d98822a80d629ed60cc80b5100607e5a2430018f2e3d3bb5fa9ee9e" already present on machine
